nable to identify CD-ROM format. [ 542.035639][T31315] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 542.053154][T31315] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 542.093096][T31315] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:35:35 executing program 4: 03:35:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = getpid() syz_open_procfs(r3, &(0x7f0000000100)='net/xfrm_stat\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r6, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r5, 0x0, 0xd, &(0x7f0000000040)='bridge_sl\tve\x00', r7}, 0x30) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) [ 542.124496][T31315] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:35:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x2}, 0xe) 03:35:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000b00150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 542.329838][T31389] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:35 executing program 5: 03:35:35 executing program 4: 03:35:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2002, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) 03:35:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:35 executing program 4: 03:35:35 executing program 4: 03:35:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000001400150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 542.682168][T31393] ISOFS: Unable to identify CD-ROM format. [ 542.708784][T31439] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:36 executing program 5: 03:35:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:36 executing program 4: 03:35:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 03:35:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000001500150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:36 executing program 4: r0 = epoll_create1(0x0) close(r0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r1, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x26e, 0x0) 03:35:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000180), 0xf0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r3 = dup2(r2, r2) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYRES16], 0x1}}, 0x0) write$cgroup_type(r3, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) [ 543.072199][T31612] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 543.120069][T31612] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000001600150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$rose(r4, &(0x7f0000000040)="d9a490b51e1cb070d2d7f0dd0816f00c5ad5cc406c5767b6bc8c20fc3bfad2bc1bce71d60566f749d98fe688af56859eae95720f926c61e694c8551d4299f8112021189526c09d29e8a01ea302a19cbb6c49410f14adf79f3f3bb225e2c5d7ef932f7d7a1daf01018b3b2ab3db4ab8486e80e9a6565a44127356491a4c731ebf5634c187ebd931a4695969fe655174a858", 0x91, 0x0, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @default}, 0x1c) ioctl$TIOCSIG(r4, 0x40045436, 0x30) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xffff, 0x0, 0xabcc, 0x100}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000200)={r9, @in={{0x2, 0x4e24, @broadcast}}, 0xffffff43, 0x401, 0xd66c, 0xfffffffd, 0x40}, 0x98) [ 543.258237][T31629] ISOFS: Unable to identify CD-ROM format. 03:35:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000003a00150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 543.374533][T31649] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000100001040200"/20, @ANYRES32=r2, @ANYBLOB], 0x44}}, 0x0) [ 543.505982][ T25] kauditd_printk_skb: 15 callbacks suppressed [ 543.505995][ T25] audit: type=1400 audit(2000000136.749:490): avc: denied { map } for pid=31651 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000006800150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4}, 0xe) [ 543.565338][ T25] audit: type=1400 audit(2000000136.809:491): avc: denied { watch } for pid=13000 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 543.598560][T31654] __nla_validate_parse: 1 callbacks suppressed [ 543.598570][T31654] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:35:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x2000) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) 03:35:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000006900150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 543.845099][T31658] ISOFS: Unable to identify CD-ROM format. [ 543.927728][ T25] audit: type=1400 audit(2000000137.169:492): avc: denied { map } for pid=31683 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 544.059159][ T25] audit: type=1400 audit(2000000137.289:493): avc: denied { open } for pid=31636 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 544.109304][T31758] netlink: 'syz-executor.1': attribute type 31 has an invalid length. [ 544.148877][ T25] audit: type=1400 audit(2000000137.289:494): avc: denied { kernel } for pid=31636 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 544.219649][ T25] audit: type=1400 audit(2000000137.299:495): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000b000150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4}, 0xe) 03:35:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) sendmsg$unix(r4, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) 03:35:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000180), 0xf0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = dup2(r2, r2) sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 03:35:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = getgid() r5 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r4}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:37 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x32) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setsig(0x4203, r3, 0x0, &(0x7f00000000c0)) [ 544.524285][T31793] hfsplus: unable to parse mount options [ 544.533188][ T25] audit: type=1400 audit(2000000137.779:496): avc: denied { map } for pid=31791 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 544.546139][T31794] ISOFS: Unable to identify CD-ROM format. 03:35:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000003a8150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="aa4f5274752f6964a79313a1b6c3856265b5cafbe54efd558ee6eaa9c7895f54b0ee1022bb3b986415ce52281dd23666c9d379b600cd84a199bc20a315428c6bfffeb28f3610345592e05ee8f4be6c1d19d97bfcfa1c1de5412806b652047dccbe11c65fee5b9d9198aab4b85483195060066827a486ef9f96085b764442f1499346bd171cfa6a3cbcda909104b016c8af8a291ded56e3483587a10ae00b237ba7872a5e94a7be9c40e00cd55891ade3d80ece508c9974c8814a88a160b88a6fd43779c23e040c064c5d", 0xca, 0x2}, {&(0x7f00000002c0)="c58fcbf739243a13d583c0144995d437b90afa5b9e3fbbd6aac2d1418074c5cb812b8399cbac073890c089b7afb1684ce9a4fcb3c1ae6099975bb71c42f131b5846a83448b3065ff517f3efe9e0cfa5bc72f3aaed91c14c293e4033884d903fa55941752e0115ef1a4302701103547833596ddce3c839f9bd1f58734bb072417c83cff540e484627d74006ad369855c4aeb1338984e1d3da2bd6a454ecaf5e88e03c62901d", 0xa5, 0xf92}, {&(0x7f0000000380)="064b03a069486e33ad59d324aced", 0xe, 0x2}], 0x0, &(0x7f0000000440)={[{@grpquota={'grpquota', 0x3d, 'system$self.em1^'}}, {@inline_data='inline_data'}], [{@pcr={'pcr', 0x3d, 0x24}}]}) r0 = shmget$private(0x0, 0x3000, 0x234e0ddb41a7403e, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/110) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) [ 544.657673][ T25] audit: type=1400 audit(2000000137.899:497): avc: denied { watch } for pid=9767 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r5 = socket$inet(0x2, 0x1, 0xff) accept$inet(r5, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 03:35:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4}, 0xe) 03:35:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000003d0150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 544.977611][T31925] ptrace attach of "/root/syz-executor.5"[14364] was attempted by "/root/syz-executor.5"[31925] [ 544.998631][T31923] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 545.031424][T31923] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 545.048441][T31925] ptrace attach of "/root/syz-executor.5"[14364] was attempted by "/root/syz-executor.5"[31925] 03:35:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = getgid() r5 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r4}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 545.104187][T31923] F2FS-fs (loop4): Unable to read 2th superblock 03:35:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="aa4f5274752f6964a79313a1b6c3856265b5cafbe54efd558ee6eaa9c7895f54b0ee1022bb3b986415ce52281dd23666c9d379b600cd84a199bc20a315428c6bfffeb28f3610345592e05ee8f4be6c1d19d97bfcfa1c1de5412806b652047dccbe11c65fee5b9d9198aab4b85483195060066827a486ef9f96085b764442f1499346bd171cfa6a3cbcda909104b016c8af8a291ded56e3483587a10ae00b237ba7872a5e94a7be9c40e00cd55891ade3d80ece508c9974c8814a88a160b88a6fd43779c23e040c064c5d", 0xca, 0x2}, {&(0x7f00000002c0)="c58fcbf739243a13d583c0144995d437b90afa5b9e3fbbd6aac2d1418074c5cb812b8399cbac073890c089b7afb1684ce9a4fcb3c1ae6099975bb71c42f131b5846a83448b3065ff517f3efe9e0cfa5bc72f3aaed91c14c293e4033884d903fa55941752e0115ef1a4302701103547833596ddce3c839f9bd1f58734bb072417c83cff540e484627d74006ad369855c4aeb1338984e1d3da2bd6a454ecaf5e88e03c62901d", 0xa5, 0xf92}, {&(0x7f0000000380)="064b03a069486e33ad59d324aced", 0xe, 0x2}], 0x0, &(0x7f0000000440)={[{@grpquota={'grpquota', 0x3d, 'system$self.em1^'}}, {@inline_data='inline_data'}], [{@pcr={'pcr', 0x3d, 0x24}}]}) r0 = shmget$private(0x0, 0x3000, 0x234e0ddb41a7403e, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/110) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0)={0x2, 0x0, {0x0, 0x0, 0x3}}, 0xe) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) sendmmsg(r4, &(0x7f0000000140), 0x40000000000025d, 0x0) [ 545.183073][T31921] validate_nla: 3 callbacks suppressed [ 545.183082][T31921] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500050004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 545.224408][T31957] ISOFS: Unable to identify CD-ROM format. [ 545.255780][T32041] netlink: 'syz-executor.5': attribute type 31 has an invalid length. 03:35:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8024099100000000500150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x80c00) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r5, 0x800455d1, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom$netrom(r5, &(0x7f0000000140)=""/139, 0x8b, 0x3163, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) [ 545.372009][T32041] hfsplus: unable to parse mount options 03:35:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = getgid() r5 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r4}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000502150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 545.471082][T32046] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:35:38 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 545.562897][T32161] netlink: 'syz-executor.1': attribute type 31 has an invalid length. [ 545.600961][T32046] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 545.631308][T32046] F2FS-fs (loop3): Unable to read 2th superblock [ 545.660191][T32170] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000000c0)={0x1a, 0x9, 0x9df, 0x44000, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00'/20, @ANYRES32=r5, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x44}}, 0x0) r6 = socket$pptp(0x18, 0x1, 0x2) setsockopt(r6, 0x0, 0x3f, &(0x7f0000000040)="ee070ae2c467ade0129bce868e4df96ed46f9c0b83dced6ebe8c9f1c6ae2788c010dc38c7d0272a48df7e57a9b6df4021a9ac77c409dc23fc25dea009bdde7534b6d852e2ff1c81ac6d536a4acfeb92e59837649b102d30c", 0x58) 03:35:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="aa4f5274752f6964a79313a1b6c3856265b5cafbe54efd558ee6eaa9c7895f54b0ee1022bb3b986415ce52281dd23666c9d379b600cd84a199bc20a315428c6bfffeb28f3610345592e05ee8f4be6c1d19d97bfcfa1c1de5412806b652047dccbe11c65fee5b9d9198aab4b85483195060066827a486ef9f96085b764442f1499346bd171cfa6a3cbcda909104b016c8af8a291ded56e3483587a10ae00b237ba7872a5e94a7be9c40e00cd55891ade3d80ece508c9974c8814a88a160b88a6fd43779c23e040c064c5d", 0xca, 0x2}, {&(0x7f00000002c0)="c58fcbf739243a13d583c0144995d437b90afa5b9e3fbbd6aac2d1418074c5cb812b8399cbac073890c089b7afb1684ce9a4fcb3c1ae6099975bb71c42f131b5846a83448b3065ff517f3efe9e0cfa5bc72f3aaed91c14c293e4033884d903fa55941752e0115ef1a4302701103547833596ddce3c839f9bd1f58734bb072417c83cff540e484627d74006ad369855c4aeb1338984e1d3da2bd6a454ecaf5e88e03c62901d", 0xa5, 0xf92}, {&(0x7f0000000380)="064b03a069486e33ad59d324aced", 0xe, 0x2}], 0x0, &(0x7f0000000440)={[{@grpquota={'grpquota', 0x3d, 'system$self.em1^'}}, {@inline_data='inline_data'}], [{@pcr={'pcr', 0x3d, 0x24}}]}) r0 = shmget$private(0x0, 0x3000, 0x234e0ddb41a7403e, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/110) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0)={0x2, 0x0, {0x0, 0x0, 0x3}}, 0xe) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) sendmmsg(r4, &(0x7f0000000140), 0x40000000000025d, 0x0) 03:35:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000503150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 545.771646][T32176] netlink: 'syz-executor.5': attribute type 31 has an invalid length. [ 545.781196][T32173] ISOFS: Unable to identify CD-ROM format. [ 545.798165][T32166] ISOFS: Unable to identify CD-ROM format. [ 545.849553][T32181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32181 comm=syz-executor.1 [ 545.903973][T32182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32182 comm=syz-executor.1 [ 546.021225][T32176] hfsplus: unable to parse mount options 03:35:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000504150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 546.068034][T32190] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 546.076089][T32190] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 546.084494][T32190] F2FS-fs (loop3): Unable to read 2th superblock 03:35:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000008be63576f06a66415567533bf4aab146097012bcd9df080000005a17f8b9e0cd9f2b869e8799fe6ab38d", @ANYRES32=r2, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x44}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) modify_ldt$write(0x1, &(0x7f0000000080)={0x66cf, 0x1000, 0x1000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000040)=""/27) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 03:35:39 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, 0x0, 0x0) 03:35:39 executing program 3: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="aa4f5274752f6964a79313a1b6c3856265b5cafbe54efd558ee6eaa9c7895f54b0ee1022bb3b986415ce52281dd23666c9d379b600cd84a199bc20a315428c6bfffeb28f3610345592e05ee8f4be6c1d19d97bfcfa1c1de5412806b652047dccbe11c65fee5b9d9198aab4b85483195060066827a486ef9f96085b764442f1499346bd171cfa6a3cbcda909104b016c8af8a291ded56e3483587a10ae00b237ba7872a5e94a7be9c40e00cd55891ade3d80ece508c9974c8814a88a160b88a6fd43779c23e040c064c5d", 0xca, 0x2}, {&(0x7f00000002c0)="c58fcbf739243a13d583c0144995d437b90afa5b9e3fbbd6aac2d1418074c5cb812b8399cbac073890c089b7afb1684ce9a4fcb3c1ae6099975bb71c42f131b5846a83448b3065ff517f3efe9e0cfa5bc72f3aaed91c14c293e4033884d903fa55941752e0115ef1a4302701103547833596ddce3c839f9bd1f58734bb072417c83cff540e484627d74006ad369855c4aeb1338984e1d3da2bd6a454ecaf5e88e03c62901d", 0xa5, 0xf92}, {&(0x7f0000000380)="064b03a069486e33ad59d324aced", 0xe, 0x2}], 0x0, &(0x7f0000000440)={[{@grpquota={'grpquota', 0x3d, 'system$self.em1^'}}, {@inline_data='inline_data'}], [{@pcr={'pcr', 0x3d, 0x24}}]}) r0 = shmget$private(0x0, 0x3000, 0x234e0ddb41a7403e, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/110) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0)={0x2, 0x0, {0x0, 0x0, 0x3}}, 0xe) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) sendmmsg(r4, &(0x7f0000000140), 0x40000000000025d, 0x0) 03:35:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = getgid() r5 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r4}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<', r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 546.319976][T32303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59019 sclass=netlink_route_socket pig=32303 comm=syz-executor.1 03:35:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000505150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000506150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 546.515336][T32303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59019 sclass=netlink_route_socket pig=32303 comm=syz-executor.1 [ 546.539145][T32305] ISOFS: Unable to identify CD-ROM format. 03:35:39 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, 0x0, 0x0) [ 546.563700][T32318] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 546.600671][T32338] netlink: 'syz-executor.5': attribute type 31 has an invalid length. 03:35:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) 03:35:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000507150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 546.617175][T32318] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 546.657263][T32318] F2FS-fs (loop3): Unable to read 2th superblock 03:35:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x4000, 0x0) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f00000000c0)=0x1, 0x4) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000080)={0x6, 0x0, 0x6, 0x8}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000097924efbc4a36a990008000000000000", @ANYRES32=r4, @ANYBLOB="000000000000060024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x3}}, 0x0) [ 546.769769][T32435] netlink: 'syz-executor.1': attribute type 31 has an invalid length. [ 546.771487][T32338] hfsplus: unable to parse mount options [ 546.788626][T32436] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:40 executing program 3 (fault-call:8 fault-nth:0): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000508150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r4 = getgid() syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid', 0x3d, r4}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r3 = dup(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x5000) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x171}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000000c0)={r6, 0x9}, 0x8) 03:35:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000509150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 547.130038][T32455] FAULT_INJECTION: forcing a failure. [ 547.130038][T32455] name failslab, interval 1, probability 0, space 0, times 0 [ 547.157437][T32458] netlink: 'syz-executor.5': attribute type 31 has an invalid length. 03:35:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050a150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 547.205915][T32458] hfsplus: unable to parse mount options [ 547.263392][T32455] CPU: 1 PID: 32455 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 547.271759][T32455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.272477][T32449] ISOFS: Unable to identify CD-ROM format. [ 547.281810][T32455] Call Trace: [ 547.281857][T32455] dump_stack+0x197/0x210 [ 547.281881][T32455] should_fail.cold+0xa/0x15 [ 547.281903][T32455] ? fault_create_debugfs_attr+0x180/0x180 [ 547.281921][T32455] ? ___might_sleep+0x163/0x2c0 [ 547.281940][T32455] __should_failslab+0x121/0x190 [ 547.281956][T32455] should_failslab+0x9/0x14 [ 547.281977][T32455] kmem_cache_alloc_trace+0x2d3/0x790 [ 547.325315][T32455] alloc_pipe_info+0x10e/0x4f0 [ 547.330150][T32455] ? __might_sleep+0x95/0x190 [ 547.334929][T32455] splice_direct_to_actor+0x80e/0xa30 [ 547.340357][T32455] ? __inode_security_revalidate+0xf7/0x150 [ 547.346247][T32455] ? avc_policy_seqno+0xd/0x70 [ 547.350998][T32455] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.352187][T32466] netlink: 'syz-executor.1': attribute type 31 has an invalid length. [ 547.356712][T32455] ? generic_pipe_buf_nosteal+0x10/0x10 [ 547.356726][T32455] ? selinux_file_permission+0x9b/0x580 [ 547.356748][T32455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.382157][T32455] ? do_splice_to+0x180/0x180 [ 547.386842][T32455] ? rw_verify_area+0x126/0x360 [ 547.391701][T32455] do_splice_direct+0x1da/0x2a0 [ 547.396557][T32455] ? splice_direct_to_actor+0xa30/0xa30 [ 547.402100][T32455] ? rcu_read_lock_any_held+0xcd/0xf0 [ 547.407504][T32455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:35:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpid() syz_open_procfs(r5, &(0x7f0000000100)='net/xfrm_stat\x00') r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x50000, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x99, 0x5, 0xc0, 0x7, 0x0, 0x68d, 0x4, 0x715c1b4bed3efacb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x2300, 0x6, 0x4, 0x8, 0x7fff, 0x1, 0x20}, r5, 0x7, r6, 0x1) r7 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x2, 0x2) dup2(r7, 0xffffffffffffffff) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x13) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x44}}, 0x0) 03:35:40 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, 0x0, 0x0) [ 547.413801][T32455] ? __this_cpu_preempt_check+0x35/0x190 [ 547.419440][T32455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.425683][T32455] ? __sb_start_write+0x1e5/0x460 [ 547.430714][T32455] do_sendfile+0x597/0xd00 [ 547.435236][T32455] ? do_compat_pwritev64+0x1c0/0x1c0 [ 547.440523][T32455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 547.446748][T32455] ? fput+0x1b/0x20 [ 547.450555][T32455] __x64_sys_sendfile64+0x1dd/0x220 [ 547.455755][T32455] ? __ia32_sys_sendfile+0x230/0x230 [ 547.461023][T32455] ? do_syscall_64+0x26/0x790 [ 547.465677][T32455] ? lockdep_hardirqs_on+0x421/0x5e0 [ 547.470953][T32455] ? trace_hardirqs_on+0x67/0x240 [ 547.475969][T32455] do_syscall_64+0xfa/0x790 [ 547.480471][T32455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.486354][T32455] RIP: 0033:0x45a679 [ 547.490238][T32455] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.509826][T32455] RSP: 002b:00007fb679fdac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 547.518231][T32455] RAX: ffffffffffffffda RBX: 00007fb679fdac90 RCX: 000000000045a679 [ 547.526183][T32455] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 547.534134][T32455] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 547.542087][T32455] R10: 0100000000000002 R11: 0000000000000246 R12: 00007fb679fdb6d4 [ 547.550037][T32455] R13: 00000000004c8f16 R14: 00000000004e0a30 R15: 0000000000000007 03:35:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x23, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 547.719670][ T25] audit: type=1400 audit(2000000140.959:498): avc: denied { open } for pid=32515 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:35:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050b150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4850}, 0x0) [ 547.907809][T32584] hfsplus: unable to parse mount options 03:35:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050c150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 548.034468][ T25] audit: type=1400 audit(2000000141.279:499): avc: denied { map } for pid=32597 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) r4 = getegid() sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000140)="85391f1c40e42f0f7de8b6b35803173a720d0bb406c4435b6b47c462c632d602c524ad01bde2a7cf8e3eeff2ea97b8da3ec583b675ba9493eafdda1c2e4663c3d223e28c28c1da8a0fcf9094facea6e700650d7b2a611f519cd1d7939f17", 0x5e}, {&(0x7f00000001c0)="a88767b8ba3cce2d2b574fc1e9c969e6c8ef00613e5a7d9475ad7fec9af99a38d563e52bc4a48f6a748f95f4f773600a1e1e5691efca039ff870e064213b2bbfaed6350fcbfc40e0e16527b0f14c20a0819b80db359eeb92a01479e82ee35603a79c1659dcf8b1cd889bd0c1329c47ed0ae29d2ce2f46883331b8f889227295da93953f723c183d2a98dfad2e6dd24641ae2e2fb4f7c139b7dab7acdf075e4afa7878f082614218eed8c2a52d6a791b1d079039abee7d8cacc1799936b13a98412e5aadd6ce0344373e9964f97b2cd8b4c2d4958138c0b3a9e3b77f5fed634ed40286b29022ca8642b0bdc1bf9fec8e0c1d6726d55f62e", 0xf7}], 0x2, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0x20, 0x74058885}, 0x4020190) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000000fdf8d1000000000024001200140001006272696467655f736c097665000000000c00050008001f00ff000000"], 0x44}}, 0x0) 03:35:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) fcntl$setstatus(r6, 0x4, 0x8ac00) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050e150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 548.276002][T32701] hfsplus: unable to parse mount options 03:35:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050f150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 548.413510][T32718] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:35:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0x3, 0x2, 0x9, 0x0, 0x2}, 0x40, 0x2}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 548.526705][ T312] hfsplus: unable to parse mount options 03:35:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0xc0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 548.580038][T32714] ISOFS: Unable to identify CD-ROM format. 03:35:41 executing program 1: socketpair$unix(0x1, 0xa227def1e84b25c8, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000080)={0x0, 0x1, 0x1}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_NR_MMU_PAGES(r7, 0xae45, 0x400) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r8, 0x2284, 0x0) [ 548.627298][ T349] hfsplus: unable to parse mount options 03:35:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000340)={0xc7, "04540cf11bb9c2ff7ed40d5ebcb7dacbaa76789e65a5e31c3220d73cce477f4bc0f16d85b628d8dc752f14ed8485355e011925465835fe11dfe104a796984924f93683bca9f029c68f7495422b2e02a40e71a52b75612db128b7aa11d1c6d537ba76b4b325266e974e5bf5d5fd0fd7032ac91d1b1bd39a1941db32838f61d10d677ac8d9b863c8a13be79d6080c9a8a77adefac7b1e75f68cd333f29d5bdbaa3b0a9e2f73c805a6e6389a66f75e33a46daec63f1ceaf0b47150c708de00a704a42bf3f4790d1d3"}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x5, {0x5, 0x4, 0x0, 0x0, 0x7}, 0x1003, 0x2}, 0x368) 03:35:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000510150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) [ 548.896958][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 548.896971][ T25] audit: type=1400 audit(2000000142.139:503): avc: denied { map } for pid=378 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000511150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 549.001502][ T394] hfsplus: unable to parse mount options [ 549.026808][ T25] audit: type=1400 audit(2000000142.179:504): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:42 executing program 3: bind$isdn_base(0xffffffffffffffff, &(0x7f0000000040)={0x22, 0x3f, 0x8, 0x3, 0x5}, 0x6) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:42 executing program 1: write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000701000f006272696467655f0800000000000000"], 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) acct(&(0x7f0000000080)='./file0\x00') sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) [ 549.239353][ T491] ISOFS: Unable to identify CD-ROM format. 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000512150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 549.359533][ T25] audit: type=1400 audit(2000000142.599:505): avc: denied { map } for pid=503 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:42 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000513150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 549.517670][ T522] hfsplus: unable to parse mount options 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000514150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 549.582259][ T25] audit: type=1400 audit(2000000142.629:506): avc: denied { watch } for pid=13000 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010426a270000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000002cfd05000800030003000000"], 0x44}}, 0x0) 03:35:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$unix(r6, 0x0, &(0x7f0000000040), 0x800) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000548150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 549.713654][ T630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 549.725295][ T616] ISOFS: Unable to identify CD-ROM format. 03:35:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000054c150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:43 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 549.802365][ T635] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 03:35:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000140)={0xa, @raw_data="220fbc026d0eee0bc886d92b7dc475087c777ff0627e13a9bf3446cead3b7f101b46beeaca468cd2b6aa8dbe722b603f03ae5ee6ca23e26105641da93a63b1cbe0e9b20b2bbb3ba29f3a8229e8988f5f0b3a7c1c50f6c44bf637cb2b32364d515fd217baf5db3f2a3646b83ebe045c323ba791a7fae40f2d3545d342a74c07d95c54fa4d3d3d7a09d3f1b5cef46f93159fe2fbf8e9da059ac43143656a4693b9db0b857261ff97ab3c76402da629005d0564e5b59c0a99bd5c767cd2289418b4df8fe06eda9e56bc"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) 03:35:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 550.000108][ T25] audit: type=1400 audit(2000000143.239:507): avc: denied { map } for pid=648 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 550.039780][ T646] hfsplus: unable to parse mount options 03:35:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000055a150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000040)={0x61}) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/\x1cX\x03\x00\x00\x00T\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\xff\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r6, 0x3b70, &(0x7f0000000380)={0x10}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x2b2, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:43 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 550.196654][ T25] audit: type=1400 audit(2000000143.279:508): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 550.208147][ T757] ISOFS: Unable to identify CD-ROM format. 03:35:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000780)={0x1f, 0x4, [0x6]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0xa3, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000006c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r8 = syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x2, 0x20000) ioctl$SNDRV_PCM_IOCTL_REWIND(r8, 0x40084146, &(0x7f0000000740)=0xddaf) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r9, &(0x7f0000000500)="ee2ac5d2e50359d7cb4915b5a5a578a79a69fdca650c23fe039305037876e6eb67efa919001380307bab632f79f0cfcd5d655b1596c6c819f03e713fc8100480d62b62a10b9fec9c1d0d6148f4ebbab87584c348be93eb8fcae3bfc48fcff62d512dba5f0f4eb545f4189cd9fc1a69c63b12a28b7402d5f4d872b4c295fd3cb3841cc5226177046a7c99896a6f", &(0x7f00000005c0)="81f73ef6411c0f4ecffb29c002e45e120d650be304ce7654170bacf5b1d3e62b9bd534cc124e99b8d68aae89611c567e63b84aa4e44c5ca405b1d393e2c46f4902d1a216ef510213d7fa0b6ba73e2f8a2c1cb69c77d9e47128986ccdb8fd35e4fe542f3aea8ba6d17a655e66d7b91da1675aacba8f05dd7de6f456e10a4bfa63726e781079adfceadc30d2d5421faab288bc46579e4e3090085095cf89af257fc82edd03fda3f7a1a831d96fd27b0e223e998361d3c21a673e42ee66d8f1091d415d34167a7a28df754bb993112530c1e6b45abcc2", 0x2}, 0x20) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000340)={0x0, {{0xa, 0x4e24, 0x6, @mcast1, 0xffffff79}}}, 0x88) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e23, @rand_addr=0x20}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r2, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c0005000800ea0000000000"], 0x44}}, 0x0) 03:35:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000560150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:43 executing program 4: syz_init_net_socket$llc(0x1a, 0x0, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) [ 550.537326][ T25] audit: type=1400 audit(2000000143.779:509): avc: denied { map } for pid=778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000568150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:43 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 550.685021][ T782] ISOFS: Unable to identify CD-ROM format. [ 550.713121][ T25] audit: type=1400 audit(2000000143.919:510): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BASE(r9, 0x4008af12, &(0x7f0000000340)={0x0, 0x660d192c}) ioctl$TCSETXF(r7, 0x5434, &(0x7f0000000040)={0x1e95, 0x0, [0xb66a, 0x9, 0xa1ab, 0x9ea, 0x100], 0x1ff}) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r10 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r10, &(0x7f0000000040), 0x10) sendmmsg(r10, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r11 = dup2(0xffffffffffffffff, r10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r11, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xfffffffffffffdd4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'irlan0\x00', r2}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x44}}, 0x0) 03:35:44 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000056c150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 551.022830][ T25] audit: type=1400 audit(2000000144.269:511): avc: denied { map } for pid=910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:44 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000180)='./file0\x00', 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 551.175606][ T25] audit: type=1400 audit(2000000144.329:512): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:44 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000574150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000340)=""/21) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r6, r5, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 551.231618][ T911] ISOFS: Unable to identify CD-ROM format. 03:35:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="44000019100001040000000000251e", @ANYRES32=r2, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x44}}, 0x0) 03:35:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000057a150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:44 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:44 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) ustat(0x6, &(0x7f0000000040)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x9, 0xa, 0x80) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000280)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xecbd9adbfc8d27ca}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x100, r5, 0x20, 0x70bd28, 0x25dfdbff, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x100}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) 03:35:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005fc150004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:44 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) 03:35:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500160004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:45 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500180004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:45 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) [ 551.913129][ T1169] ISOFS: Unable to identify CD-ROM format. [ 551.992687][ T1186] validate_nla: 5 callbacks suppressed [ 551.992697][ T1186] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500400004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:45 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000)=0x2, 0x4) [ 552.109628][ T1295] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r6 = add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c307ec8d34d561d8b25a50977ed51b4c194c004500e371981f7507dafba57cb5625de4c7637d2ae1276208b6abbe7e26f0d038ce5e65c5516529d913125cf320813b9f65f26015c02729efba2c747928c905382fee1d26cc0bf714ecbdecf33c7f13050ad7228ecaa5b339d9e1e2a3017ef757b50336fb4453be849218593c4bc007f792f21ff2cf0112843d458f10f5", 0x90, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x9, r6) 03:35:45 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', 0x0, 0x239d, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r3, &(0x7f0000000040), 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) fsetxattr$security_smack_transmute(r3, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r8 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xd0, 0xf0ac28658773cd31) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x28}}, 0x0) 03:35:45 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000)=0x2, 0x4) 03:35:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500680004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:45 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5c895a04ccc98c150c7446e3aacc87cacd74cd5b419b03e6c2463dde73b897cf0577fb2b213582a8176a4b9fcc72e0b74f4b6c47d18b98de03d120110db7135f7b7bc1666917b4815b6fc09fbd471ad8c6549ab7d061d1a4ac8007f080520508c1e99d85ebd391d169bb2c52dfbaf4eb7e3b06a6e816460fadbe0253a3cc48799694d08cdb644fff436723067e31ec7955668305fdfad2d2e46187e72506776c1a0c76efcc6d47e51f1f4e04f45aef5df0246543ab2e809954d480c70b3ec2bd44fa278fabf1b141e12318", 0xcb, 0x36b}], 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 552.488708][ T1309] ISOFS: Unable to identify CD-ROM format. 03:35:45 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000)=0x2, 0x4) [ 552.564740][ T1434] hfsplus: unable to parse mount options 03:35:45 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x90, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af09, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xffc, 0x475bfd2245752797, 0x1000000}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500690004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:46 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000)=0x2, 0x4) [ 552.838139][ T1457] hfsplus: unable to parse mount options 03:35:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0411d21382000000000000000000"], 0xe, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='security.SMACK64IPOUT\x00', &(0x7f00000002c0)={'devlink\x00'}, 0x9, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000010000104000000000000000000000000f26f812665d918528e7fcc5dd20d792e8567fe50b8c7da7641000c063e46e55d53f513d112dc0441d2821c3efe6ba401933286d5cddf205cea1499bd98be3d32f6a687267c0e0076d7dcbca7617db53485fc9373583d3cab03cc88846c366055c2", @ANYRES32=r2, @ANYBLOB="000000000000000024001200140001006272696467655f736c097665000000000c00050008001f0000000000"], 0x44}}, 0x0) 03:35:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500050004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000a00)={@broadcast, @multicast1, 0x0}, &(0x7f0000000a40)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x40000) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', r1}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000010000104000000000000000000010000", @ANYRES32=r4, @ANYBLOB="cfa264b5b754ac537fba15e025b7d733f2feff00000911e9000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) 03:35:46 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, 0x0, 0x0) [ 552.996739][ T1509] ISOFS: Unable to identify CD-ROM format. [ 553.009887][ T1565] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 553.024318][ T1567] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:35:46 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}, {@gid={'gid'}}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500160004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 553.286081][ T1582] hfsplus: unable to parse mount options 03:35:46 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:46 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, 0x0, 0x0) 03:35:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1fe) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_TIMEOUT(r8, 0x0, 0x48a, &(0x7f0000000400)={0x7, 0x6, 0x2}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) r9 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r9, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x4000000000002ae, 0x0) r10 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) fcntl$dupfd(r10, 0x0, 0xffffffffffffffff) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) symlinkat(&(0x7f0000000340)='./file0\x00', r12, &(0x7f0000000380)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500180004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)={0x3c, r4, 0x536ae464467e3e0b, 0x0, 0x0, {0xb}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r4, 0x302, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4024000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r7, @ANYBLOB="000000000000000024001200140001006272666467655f736c097665000000000c0005000840c74e23000000"], 0x44}}, 0x0) 03:35:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:46 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, 0x0, 0x0) 03:35:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000140)={0xa, @raw_data="220fbc026d0eee0bc886d92b7dc475087c777ff0627e13a9bf3446cead3b7f101b46beeaca468cd2b6aa8dbe722b603f03ae5ee6ca23e26105641da93a63b1cbe0e9b20b2bbb3ba29f3a8229e8988f5f0b3a7c1c50f6c44bf637cb2b32364d515fd217baf5db3f2a3646b83ebe045c323ba791a7fae40f2d3545d342a74c07d95c54fa4d3d3d7a09d3f1b5cef46f93159fe2fbf8e9da059ac43143656a4693b9db0b857261ff97ab3c76402da629005d0564e5b59c0a99bd5c767cd2289418b4df8fe06eda9e56bc"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_sl\tve\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GROUP_FWD_MASK={0x8}]}}}]}, 0x44}}, 0x0) [ 553.643293][ T1711] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 553.679115][ T1715] hfsplus: unable to find HFS+ superblock 03:35:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r4, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r8, &(0x7f0000000040), 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r9 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r9, 0xc10c5541, 0x0) r10 = fcntl$getown(r9, 0x9) perf_event_open(0x0, r10, 0xe, r9, 0x0) ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f00000003c0)=r10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept$ax25(r12, &(0x7f0000000340)={{0x3, @netrom}, [@default, @remote, @default, @default, @bcast, @null, @null, @bcast]}, &(0x7f0000000040)=0x48) 03:35:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500680004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:47 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:47 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 553.907260][ T1833] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 03:35:47 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500690004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 554.055290][ T25] kauditd_printk_skb: 20 callbacks suppressed [ 554.055303][ T25] audit: type=1400 audit(2000000147.299:533): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 554.142862][ T1847] hfsplus: unable to find HFS+ superblock 03:35:47 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 554.184179][ T1849] FAULT_INJECTION: forcing a failure. [ 554.184179][ T1849] name failslab, interval 1, probability 0, space 0, times 0 [ 554.198981][ T1849] CPU: 0 PID: 1849 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 554.207242][ T1849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.207250][ T1849] Call Trace: [ 554.207275][ T1849] dump_stack+0x197/0x210 [ 554.207300][ T1849] should_fail.cold+0xa/0x15 [ 554.207318][ T1849] ? fault_create_debugfs_attr+0x180/0x180 [ 554.207336][ T1849] ? ___might_sleep+0x163/0x2c0 [ 554.240376][ T1849] __should_failslab+0x121/0x190 [ 554.245319][ T1849] should_failslab+0x9/0x14 [ 554.249807][ T1849] __kmalloc+0x2e0/0x770 [ 554.254553][ T1849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.260775][ T1849] ? fput_many+0x12c/0x1a0 [ 554.265185][ T1849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.271406][ T1849] ? strnlen_user+0x1ed/0x2e0 [ 554.276066][ T1849] ? __x64_sys_memfd_create+0x13c/0x470 [ 554.281606][ T1849] __x64_sys_memfd_create+0x13c/0x470 [ 554.286961][ T1849] ? memfd_fcntl+0x18c0/0x18c0 [ 554.291706][ T1849] ? do_syscall_64+0x26/0x790 [ 554.296366][ T1849] ? lockdep_hardirqs_on+0x421/0x5e0 [ 554.301632][ T1849] ? trace_hardirqs_on+0x67/0x240 [ 554.306639][ T1849] do_syscall_64+0xfa/0x790 [ 554.311129][ T1849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.317002][ T1849] RIP: 0033:0x45a679 [ 554.320881][ T1849] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.340465][ T1849] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 554.348854][ T1849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 554.356803][ T1849] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 554.364840][ T1849] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 554.372796][ T1849] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 554.380759][ T1849] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 [ 554.411400][ T25] audit: type=1400 audit(2000000147.309:534): avc: denied { map } for pid=1841 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:47 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:35:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2300, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150200008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:47 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000000074e010e3a2aa51fe7d6439b8c6f40d4fef975e0dad8fff431c4589069a283a0c498bafbcc05f8511de0a38703054784a160f326df6c8c158a0e5c60055a19a5890154eeecce038d68c20609fc3ac50bd3f94fd3dfb197ce869b0084535db2de6690255dda4fd63bbcbce2e3eefc6d6a5f143a0973fcd98ef0d590626a0bf756be997fe88abef01981d84c7d09af9edc42630c1499897425533e48096661e98022ea3201ba42527f2c0d30db16a15219ae1d1626f3c3a02008a7f99fa8964de95e711255f78b79d806000000eb6c9ff19b3ae0a1ecb7", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={r8, @in={{0x2, 0x4e24}}, 0x2, 0x4, 0x0, 0x10001, 0x29}, &(0x7f0000000040)=0x98) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r10, r9, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x29, 0x5, &(0x7f0000000000), 0x4) 03:35:48 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500156800008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 554.756666][ T25] audit: type=1400 audit(2000000147.999:535): avc: denied { watch } for pid=13000 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 554.857180][ T1999] hfsplus: unable to find HFS+ superblock 03:35:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000000), 0x4) [ 554.939540][ T25] audit: type=1400 audit(2000000148.129:536): avc: denied { map } for pid=2037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 555.000799][ T2103] FAULT_INJECTION: forcing a failure. [ 555.000799][ T2103] name failslab, interval 1, probability 0, space 0, times 0 03:35:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 555.075809][ T2103] CPU: 0 PID: 2103 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 555.084090][ T2103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.094148][ T2103] Call Trace: [ 555.097456][ T2103] dump_stack+0x197/0x210 [ 555.101804][ T2103] should_fail.cold+0xa/0x15 [ 555.106405][ T2103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.112476][ T2103] ? fault_create_debugfs_attr+0x180/0x180 [ 555.118293][ T2103] ? ___might_sleep+0x163/0x2c0 03:35:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500156900008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:48 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0xff9c) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) open(&(0x7f0000000040)='./file0\x00', 0x561000, 0x81) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-monitor\x00', 0x288000, 0x0) bind$llc(r7, &(0x7f0000000040)={0x1a, 0x338, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) fallocate(r6, 0x54, 0x401, 0x7ff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @mcast1, 0x8000}}}, 0xa0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$bt_l2cap(r11, &(0x7f00000000c0)={0x1f, 0xd4, {0x0, 0x4, 0x0, 0xcc}, 0x4000, 0x2}, 0xe) [ 555.123154][ T2103] __should_failslab+0x121/0x190 [ 555.128103][ T2103] ? shmem_destroy_inode+0x80/0x80 [ 555.133225][ T2103] should_failslab+0x9/0x14 [ 555.137739][ T2103] kmem_cache_alloc+0x2aa/0x710 [ 555.142597][ T2103] ? __alloc_fd+0x487/0x620 [ 555.147109][ T2103] ? shmem_destroy_inode+0x80/0x80 [ 555.152225][ T2103] shmem_alloc_inode+0x1c/0x50 [ 555.156996][ T2103] alloc_inode+0x68/0x1e0 [ 555.161330][ T2103] new_inode_pseudo+0x19/0xf0 [ 555.166017][ T2103] new_inode+0x1f/0x40 [ 555.170097][ T2103] shmem_get_inode+0x84/0x7e0 03:35:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000), 0x4) [ 555.174783][ T2103] __shmem_file_setup.part.0+0x7e/0x2b0 [ 555.180344][ T2103] shmem_file_setup+0x66/0x90 [ 555.185074][ T2103] __x64_sys_memfd_create+0x2a2/0x470 [ 555.190456][ T2103] ? memfd_fcntl+0x18c0/0x18c0 [ 555.195222][ T2103] ? do_syscall_64+0x26/0x790 [ 555.199906][ T2103] ? lockdep_hardirqs_on+0x421/0x5e0 [ 555.205194][ T2103] ? trace_hardirqs_on+0x67/0x240 [ 555.210228][ T2103] do_syscall_64+0xfa/0x790 [ 555.214838][ T2103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.220735][ T2103] RIP: 0033:0x45a679 03:35:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015ae01008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 555.224638][ T2103] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.244350][ T2103] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 555.252770][ T2103] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 555.260744][ T2103] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 555.268718][ T2103] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 555.276675][ T2103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 555.284718][ T2103] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 [ 555.330074][ T2121] hfsplus: unable to parse mount options [ 555.343697][ T25] audit: type=1400 audit(2000000148.569:537): avc: denied { map } for pid=2148 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:48 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 555.417179][ T25] audit: type=1400 audit(2000000148.619:538): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:48 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@restrict={0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x8001}}, @const={0xa, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x5f, 0x0, 0x2e]}}, &(0x7f0000000040)=""/27, 0x4d, 0x1b, 0x1}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015af01008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000), 0x4) 03:35:48 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 555.667038][ T2244] FAULT_INJECTION: forcing a failure. [ 555.667038][ T2244] name failslab, interval 1, probability 0, space 0, times 0 [ 555.731360][ T25] audit: type=1400 audit(2000000148.979:539): avc: denied { map } for pid=2245 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 555.764885][ T2244] CPU: 0 PID: 2244 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 555.773158][ T2244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.783210][ T2244] Call Trace: [ 555.786500][ T2244] dump_stack+0x197/0x210 [ 555.790826][ T2244] should_fail.cold+0xa/0x15 [ 555.795407][ T2244] ? fault_create_debugfs_attr+0x180/0x180 [ 555.801202][ T2244] ? ___might_sleep+0x163/0x2c0 [ 555.807020][ T2244] __should_failslab+0x121/0x190 [ 555.811956][ T2244] should_failslab+0x9/0x14 [ 555.816452][ T2244] kmem_cache_alloc+0x2aa/0x710 [ 555.821385][ T2244] ? __put_user_ns+0x70/0x70 [ 555.825969][ T2244] ? percpu_ref_put_many+0xb1/0x180 [ 555.831157][ T2244] security_inode_alloc+0x39/0x160 [ 555.836252][ T2244] inode_init_always+0x56e/0xba0 [ 555.841183][ T2244] alloc_inode+0x89/0x1e0 [ 555.845603][ T2244] new_inode_pseudo+0x19/0xf0 [ 555.850266][ T2244] new_inode+0x1f/0x40 [ 555.854317][ T2244] shmem_get_inode+0x84/0x7e0 [ 555.858981][ T2244] __shmem_file_setup.part.0+0x7e/0x2b0 [ 555.864513][ T2244] shmem_file_setup+0x66/0x90 [ 555.869174][ T2244] __x64_sys_memfd_create+0x2a2/0x470 [ 555.874531][ T2244] ? memfd_fcntl+0x18c0/0x18c0 [ 555.879279][ T2244] ? do_syscall_64+0x26/0x790 [ 555.883939][ T2244] ? lockdep_hardirqs_on+0x421/0x5e0 [ 555.889207][ T2244] ? trace_hardirqs_on+0x67/0x240 [ 555.894213][ T2244] do_syscall_64+0xfa/0x790 [ 555.898704][ T2244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.904590][ T2244] RIP: 0033:0x45a679 [ 555.908574][ T2244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.928159][ T2244] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 555.936552][ T2244] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 555.944512][ T2244] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 555.952464][ T2244] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 555.960437][ T2244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 555.968399][ T2244] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 03:35:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015c001008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:49 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 556.063597][ T25] audit: type=1400 audit(2000000149.009:540): avc: denied { watch } for pid=13011 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f0000000040)={0x21, 0x2}) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 556.137542][ T2345] hfsplus: unable to parse mount options [ 556.222582][ T2328] ISOFS: Unable to identify CD-ROM format. [ 556.230118][ T2368] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150802008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 556.360971][ T25] audit: type=1400 audit(2000000149.549:541): avc: denied { map } for pid=2371 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:49 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), 0x4) 03:35:49 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:49 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 556.465969][ T25] audit: type=1400 audit(2000000149.569:542): avc: denied { watch } for pid=9767 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150902008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r6, 0xc008ae67, &(0x7f0000000340)={0x5, 0x8c8}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 556.589310][ T2482] FAULT_INJECTION: forcing a failure. [ 556.589310][ T2482] name failslab, interval 1, probability 0, space 0, times 0 [ 556.664739][ T2490] hfsplus: unable to parse mount options [ 556.689855][ T2482] CPU: 1 PID: 2482 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 556.698131][ T2482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.708183][ T2482] Call Trace: [ 556.711474][ T2482] dump_stack+0x197/0x210 [ 556.715816][ T2482] should_fail.cold+0xa/0x15 [ 556.720423][ T2482] ? fault_create_debugfs_attr+0x180/0x180 [ 556.726242][ T2482] ? ___might_sleep+0x163/0x2c0 [ 556.731118][ T2482] __should_failslab+0x121/0x190 [ 556.736077][ T2482] should_failslab+0x9/0x14 [ 556.740589][ T2482] kmem_cache_alloc+0x2aa/0x710 [ 556.745445][ T2482] ? __put_user_ns+0x70/0x70 [ 556.750047][ T2482] ? percpu_ref_put_many+0xb1/0x180 [ 556.755280][ T2482] security_inode_alloc+0x39/0x160 [ 556.762228][ T2482] inode_init_always+0x56e/0xba0 [ 556.767178][ T2482] alloc_inode+0x89/0x1e0 [ 556.771517][ T2482] new_inode_pseudo+0x19/0xf0 [ 556.776199][ T2482] new_inode+0x1f/0x40 [ 556.780280][ T2482] shmem_get_inode+0x84/0x7e0 [ 556.784971][ T2482] __shmem_file_setup.part.0+0x7e/0x2b0 [ 556.790532][ T2482] shmem_file_setup+0x66/0x90 [ 556.795221][ T2482] __x64_sys_memfd_create+0x2a2/0x470 [ 556.800638][ T2482] ? memfd_fcntl+0x18c0/0x18c0 [ 556.805432][ T2482] ? do_syscall_64+0x26/0x790 [ 556.810117][ T2482] ? lockdep_hardirqs_on+0x421/0x5e0 [ 556.815412][ T2482] ? trace_hardirqs_on+0x67/0x240 [ 556.820448][ T2482] do_syscall_64+0xfa/0x790 [ 556.824971][ T2482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.830881][ T2482] RIP: 0033:0x45a679 [ 556.834788][ T2482] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.854404][ T2482] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 03:35:50 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), 0x4) [ 556.862833][ T2482] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 556.870815][ T2482] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 556.878785][ T2482] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 556.886755][ T2482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 556.894721][ T2482] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 03:35:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500154002008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:35:50 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) r6 = msgget(0x3, 0x37c) msgctl$IPC_RMID(r6, 0x0) msgsnd(r6, &(0x7f0000000500)={0x0, "cbc20df3b54122d1b8929ef41bfd574fbdad5038acd30593e7ea279703af67d6edfb7d87fc20b1027d96870afed02bf238a718389e6f3f81b29c1e04c4396244280f35519a220815f85ab748042ab6c3d41e49aaa385f83a42c29e44cb3f41399e7cdb60e7f0d6a09ebc28e3359ba9891a291f377f1cd5b266fd08d87bb97a2a6a17b4b47bf454d1bb60a8732441fa8224523827ce7c14ad1c8fd79f9b189df3ae268a87417efb22313c581c4c5bb0e014c510b42a17805c21cf2d58911b0115f243f3fbf60d43a997d29c70447d6323e4ed4b8adadc4a9db5f9b8855bdf59c91d6ced33c29343be5647c0e9305028ebbc3d47a8b3c213c6f999985c08ff67bc2e6fd042fc18bb892dac7cb5b2a34c0b71adedfaa98929f7ed22f25266c2a8c996d1ccf74ca63af11c4e8db111dc68f8f500e0ac8057093f5381752f343cd1370b3ddb51a24c166ac0b88c620fe45835541d6c7b1ff7e77838df0d32fb35ae2144f03d3a4a11e8317d393551ae06bfe16af60c0294ea58a684f0d55f9105cedcb03c1e884e456da21e3c87fee28a160098c900b16200e13c96a29d984a7a2a04c78b1fc8454ca66ee3b17cf718a89f39a7bafd818c4a13d699808d5b224a2bcea0c77890d5eb07b7897a60574210b893f97f32e3cdfbc3dbf6138c70d323bc4b5299f0217dad99c45c56c63961f5fa0b311b7b008302373d300090b6b2c68c8cdddda5eb283b62487650c5b97ad64fb40a294d2db32f46486ab27dd3a1e6a9a067e788f50c3f44b726f556af428041da49ae168719777f01364c9339a886b2086caac385feb4de70db88895bf365b41d3dc262faeb397c0df9ef05624a8d3324f8621122bd42c8a00bd7d3283053846ccf9428e90e50a4cf1ca4d1380015ddacdce87e082246ecd63c0cfbd430bcf80783c875bcf88ec7203e3c404b3744cf3e10ce1b9bd36b16d9974deba1c3013dfe231136c34d3d86e83082f5483659e23db6821be57163ebb292c263c3f7cbd445f8bffef8acaa9d6db49153dc11bc3b22abae34add821cd7e3b9f86b0b2cda6e19e8ac0bf9d925bb55434f56152ffe9a832bca2bd7f7e24697a891cdc1262a7a051ee91d003a9988418a4a957d57beb42f7fe25433af6d8de1b0722c150050a8d8eb37263d257ddf9b1df7ab28e9c4a5e4737e1d91b5d35d549f635c389d0716f46b3537648127bd80a74e5925a5a21e28c0d055e13a7c3aab975a5b7069699a4d1e65cbaabe739b5c3fd2a3aead81d1a3d9b8c75904841c11ea956e214690ed3adbc94fe602c854058b13b301001f303445f1917090ef987d8cb9e4f30907a245c7c493a92bbe44fb9a480e7d6722381ef604c80d4356e042265d4a44ff63a4c34c284afcfca096fa36822f5c8c6a8858216484d3d1a4cbbaa3b8f366727bdd3ecab5f96aeba5e6321d938d12addd26e6cbe53060b43013f66d12c0d0af1399162303d2f079355bee908e43e273d314768ca7f66bc0a6021fe79fceb678d0fe5c129e2f33ffed1cff1a778f6e50d515c267ed4f0116b1c3a507718dca789a77b79c33864db539b66d6d9ade88a165c4f4ceb9f7cb2aa5af129cf2e6068aa0f2c0cd93ab88d5af02e5d3748479eb037018c5adc69f9f09e60ab19ad6cbb2bb366c85323a6ed0f4a780db2e2fe68c7717a7e704292b23f9d61c8e10d2e95c41f31c6a6590551861cf277de2de9dd63b472866d9e077d5b5bef278dccb13a5bdef316174a5ad079058ba9f39ed5b92ca31734b2cba7f5bca1457b9f3c52b1c0cd2c4ef7d340dc053a8bf7ea87c67a3766cea207473202c494f5b10c7bfcd267dcf67fa281a044922b32c25c196367ec2eef147e15af92f245e7814dcbdc0afc83290666c22b105a7815b252550da8a2b0ba93f5d7bb150c7c0d6e78572bc48ceeefe7e73e72826c20706e45d96adb9131d9371c80b7e300bc15eff2b6bf4a31b6ae3ddebca2254a2e7296d22603db54ec062a321d75ae66380b3580f8994ca83dc6b4febdaec0d7e9503f26cb3c08058afb9da92d3e0322e5936f43766ccfda36b72dd2e78ba42e17a7d5ae746789b7a7ab3fcb056dad1431d6671c96348076088659e3274aeeb6101eed51c7b78a57761b8ea28ddaa2113a2434ffd5b23ec8ff50d4c9b12bd37bfcf9f7b6d04c54a5c4128b680fdd4fd58d1256963ab757f55bc24aec42daede7134d9a31f3526ef6e9cb56cc2256d6b3964d9797006859a13963b1982de57a9c62e94fa34294a2b38105404fb4ff455d1622504189bd3466769c66f38c8575736f9de7a64a820896fb5aae3aed49b583ac87419b53e45b14229409744b874a38bea61dd431ddfc7c781e78bd4479ad866b2deb92be8e90eb39ae300c255c7480352ab2ae76dea69d05644589eecf19dc123ac7570273c5b08104bed60e08919f89bb6d1c2b00822c2983a3cc4e9a35ff1f4177040edc1298e3b4857a8392c89d438e0db06434e4b77794e0354d213a8d16bc379abd83e33ebe3e6fb2487aeaec8948d617fe3d79af427dc1165c646a71dcc5db04e5661173d78ab9e56d60636bc804f18480171b0b68e130e9f3bf3549d73ada67e32dad4ce9ffe3a126f3d0db3e3f41366cba94fcb96e157d4023a11be2dd898bf6f45470dfd0fc138f900580e90d0dd80803f49b3419a3ae268f4a096920aa62a21ceae48c7bfd30da31dce1b56fe35afebad08a0336121f24dd7a90203ff3e8b03cda80a67f853be955d3269b1e80419f673140a6cda308c73a69f18ea3a20ad93a6b948dec4b83fb713c3a4d807fa1c2dd04f78ab8203f8df1084eb478ae23db763139da6761606f74e46472b6149d07ea31fe9f0de6a2ef32f800a9790e0649b0dd227d2c939ee30ef924dd55e202d6c6886d395ce89cf04c9dcf80f98b4c83cd17b0676f4fa8a101928218b2744f6c6e1db91f1655be531a759441302187b9008d2491c1c55833e1754667c48ba21e6d85236877a1717bc9050bff723f16e8aa82944c8d37c7a8149e9e14d99459d84a9a19836a380cf0de65929340a4478f5ff94f5e7e05e68813765d5704529db41012d3b0e3472086b0e4722f4d06e4c3575c0aedb5cf40049e7adc7a70e3367c53ef5b86e6ce393b2fb3e949ec5f09ffd4cda8dd0dc0308d3daed98e754aec8de2d166ef3b2738cdb1f4e8c18f1bd3851df2268c932d6cc7d82ac7f4d24de001d8f2a9575324a5d91cfa50925e49d22c98d66bacd01a0cff63b22e2a5b2785e4f04ee286c3b6816dfdeb0b5ea5ade4759c760972f832f7a582eb268bed15b74c05f941330a3c9e43d701b2c38fb6832c7e07006da490d9511bb8b8234fe085bb9db805b972f6127a6d6e8b029e5f492502ab4362d82aeaeb66b68f53d5893d54625ac5110ea4942b13857b63f0de79bfeabd71a33c50a56c544a2e9784c5245fab6a61318e67f8a5bd5c4d98316b35ca625dfbd393846d13578c22b27083729f5753157803320f64a6b95cba03fcd92bd1c4ce2b83fa5eca40af9df756c4670df36f01c181bbe6bfd84718fa38d8ec0977c65de1ec6c016aa993aa58a5ea198d56a8f65c9fb3524a41684a06e8bbfe1cdb589929dd8e0dfbac42956e13a0e8395dd97c3850d8e247685441d1cd6601c05084dcced146b1f2a937388cde466fc27a9300c29337bfe9add09f9f3a11f02d7e3fd4a8946bab12273c7368d72dbd6e5d7da60e5447800b491b613132552a3699bf36324c10da2073914ce1e5a13610ad6fe59f4b751a3689363688df220c0b6c13c23561b74695bd959e2dd83f4ae8dda4dd88f9fba3c0e2e98b5eb80b7e25edcffc22f6e69bda1a03c41224d38aa34f86c5737504003719628b95f1876c1d21eb9fa2b0cadb240344ce354e5dd424c5ea4739648feb3c30d242dd9c9e53c70643cd80c66743fa36359e1c4cd68cfd1c4b7741290cf3b24f1cc2f85e8aad70e96196ab2bdfb7f0c41ee2baea1e38510c36de80f717c93cae958c81ce1d9fbd0606b689f980661ff541e3b61cb9f3e391b77318f60a1463e792f9c7a8b1cc8db5a01f94f0fffe981375c472ec1a12c820279728cd3a44c80d78cfd2b1aa5a5544c92976296046e4be7846bd59b73a1a847b46f9e9ce7ed80b7feff18ec917d286b7e2ddd1421a9c21afc1249d976e1204ad46cc71fffa1e966f592de35b6cc8efdd118118d24cbe789a0cdb3e3dc71cddf3886e1908600849a60662716df88c4e93e89d9e5ff066eda8b6611e2fdbcf77e6fdad4745f6eea97ea8be14c81cbfe2378e848a09fb40865e6ac6a3c0fdfe3168745ce8bf0c015784cdd08882a1ef5a181e0ac697204a3e71cf337cd02904c4feda99dd3b445da920d8e6b6c3490915da62617a55e109ec4b8de245362a922d08c73745e0403e670e3b1c8e09c26baaef996084f774bdf692ea9fb1c23e2235abfcbf47424940005e7bac2dea37ed21b95174b6db35f00ba3e7e2729ae3b72fc1027a4f0ba8ae39ff4a13235a778a9e614a183f9ac1270f430bcd38fd8c9166877a7515912bc86dc14efc368ec4ec51d956db381d12215a0ad8315ba1c9ca4595ec66c898dd96dad9cc3e30697460dc1325d47ef429d4999587eb04a77da6fc33323312b895799c243095832b3a47e3391c5f658ddbb48447ab80fd5eb0fa63bfbf877f2dcadd2912bc22d221e6ebcd2d8a6b43839a27051b96f2a31226f175208c940fc6ce39acca06c0bbe9ed4bf063a18b64b95f47a2785627438be70ff45d14c6f0669211dc2e29298199fd31d5fb888e9e88da7673052a88f31b06dfb62130c26c77aac3dab98b48295e332883cb57289eff330d5ee31965ca653c43240039498b8018e3869724b6ff1158eabde54bfbfbb52b9df01db666cc173d09411279402253fea9ba090bb37f048a4231861c6b7514293f3d31333b174856e414e90123157ce6209a29dc8adbb5f70e936f0c15c70f7d9c0e219725f66a83f8db220c0fa2fccc3453898716b51b7a045ede1103762d55b6295e49ce2cf23e3ff529068d5f5fab7123dd758fdb6a27a0d87541d85accec427835edfb60993dc3de559ca473a48be3cd0b7e085f9c9e74845ebd2af3ff2dbbe1622c25ef96b96532ed11e8d05ba708c54a366aef604bc94683e19ed0eca6196f46f4ccea7f982f994a57714dab8932fa41d5b20b940b61f7d52bf6598cc1e935a9ed08195363f7265d653563e35ddc2e36c9cf29146f521e8761b49f6d8a042f137a6aec2aa485f3851d90dc3bf392ac2b3a456f8f83e7f8db72fd389711f43ba4a9bd75bd26c0ee2e4563adbf542a9db9dd61254e35789e665db8ff4a6df1c3820c4e24bf6d26d095ea5b216fbeb69c5834bb7f6ef52259263a4ca96424dc785f57bf1342ace08bd9542695a1f5c277785a7f5cf1df90184b053eab7181067cfc0ed131a5346d36c4db0a703863c71c44741e64d4f919d6042a1a989d78257955f782afdd439aa8b692d0e38879cae012f8b05029de9c9f4e4c7675ab0f2c5071ca34c8a05aaf88060b61cc9ac9cf2b2c69c7edd06a655d24b59af4e8d28e4e913379c531858081846a3bbd27c66eb33c6aa8f1079e535ac8e8caeec22aff54845d0c5b112364af334e521b317e6732583cfb04ea5b7a807c13bc19b7b26798d6b32d61756f3a08299ddf75e25bebaec7edd21ca8e5aa8b4556e463e0cdb30db61fa8c762925a78d8afe938172ef389e7380c607ca92b0c1b91e5104d0daed352be01d3bd773734d3665c9fa80ddfe58412d6c39e84de67a844c93abfe032f4abb371c7b2d6f4791a6f1abb"}, 0x1008, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) socketpair(0x4, 0x80003, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$llc(r7, &(0x7f0000000340)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x10) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:50 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff00, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 557.135895][ T2614] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:50 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), 0x4) [ 557.187692][ T2617] hfsplus: unable to parse mount options [ 557.195924][ T2614] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 557.222385][ T2615] FAULT_INJECTION: forcing a failure. [ 557.222385][ T2615] name failslab, interval 1, probability 0, space 0, times 0 03:35:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500158002008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:50 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 557.306282][ T2739] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 557.322343][ T2739] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 557.378901][ T2615] CPU: 1 PID: 2615 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 557.387186][ T2615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.397245][ T2615] Call Trace: [ 557.400547][ T2615] dump_stack+0x197/0x210 [ 557.404887][ T2615] should_fail.cold+0xa/0x15 [ 557.409494][ T2615] ? fault_create_debugfs_attr+0x180/0x180 [ 557.416442][ T2615] ? ___might_sleep+0x163/0x2c0 [ 557.421305][ T2615] __should_failslab+0x121/0x190 03:35:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015c002008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 557.426254][ T2615] should_failslab+0x9/0x14 [ 557.430766][ T2615] kmem_cache_alloc+0x2aa/0x710 [ 557.435625][ T2615] ? rwlock_bug.part.0+0x90/0x90 [ 557.440568][ T2615] ? lock_downgrade+0x920/0x920 [ 557.445429][ T2615] __alloc_file+0x27/0x340 [ 557.449844][ T2615] alloc_empty_file+0x72/0x170 [ 557.454654][ T2615] alloc_file+0x5e/0x4d0 [ 557.458885][ T2615] alloc_file_pseudo+0x189/0x280 [ 557.463823][ T2615] ? alloc_file+0x4d0/0x4d0 [ 557.468340][ T2615] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 03:35:50 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = getpid() syz_open_procfs(r4, &(0x7f0000000100)='net/xfrm_stat\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000600)) r7 = gettid() r8 = syz_open_procfs(r7, &(0x7f0000000580)='\x8dUtp 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.544344][ T2615] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 557.552918][ T2615] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 557.560888][ T2615] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 557.568856][ T2615] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 03:35:50 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 557.576809][ T2615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 557.584763][ T2615] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 03:35:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff0f, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 557.693818][ T2750] hfsplus: unable to parse mount options [ 557.695669][ T2755] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 557.731034][ T2755] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:51 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:51 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x3c, 0x4) 03:35:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150003008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 557.852672][ T2867] FAULT_INJECTION: forcing a failure. [ 557.852672][ T2867] name failslab, interval 1, probability 0, space 0, times 0 [ 557.901015][ T2867] CPU: 1 PID: 2867 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 557.909301][ T2867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.919362][ T2867] Call Trace: [ 557.922670][ T2867] dump_stack+0x197/0x210 [ 557.927022][ T2867] should_fail.cold+0xa/0x15 [ 557.931626][ T2867] ? fault_create_debugfs_attr+0x180/0x180 [ 557.937776][ T2867] ? ___might_sleep+0x163/0x2c0 [ 557.942740][ T2867] __should_failslab+0x121/0x190 [ 557.947682][ T2867] should_failslab+0x9/0x14 [ 557.952187][ T2867] kmem_cache_alloc+0x2aa/0x710 [ 557.957032][ T2867] ? kmem_cache_alloc+0x364/0x710 [ 557.962052][ T2867] security_file_alloc+0x39/0x170 [ 557.967075][ T2867] __alloc_file+0xde/0x340 [ 557.971488][ T2867] alloc_empty_file+0x72/0x170 [ 557.976236][ T2867] alloc_file+0x5e/0x4d0 [ 557.980468][ T2867] alloc_file_pseudo+0x189/0x280 [ 557.985402][ T2867] ? alloc_file+0x4d0/0x4d0 [ 557.989987][ T2867] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 557.996215][ T2867] __shmem_file_setup.part.0+0x108/0x2b0 [ 558.001838][ T2867] shmem_file_setup+0x66/0x90 [ 558.006507][ T2867] __x64_sys_memfd_create+0x2a2/0x470 [ 558.011864][ T2867] ? memfd_fcntl+0x18c0/0x18c0 [ 558.016610][ T2867] ? do_syscall_64+0x26/0x790 [ 558.021268][ T2867] ? lockdep_hardirqs_on+0x421/0x5e0 [ 558.026542][ T2867] ? trace_hardirqs_on+0x67/0x240 [ 558.031551][ T2867] do_syscall_64+0xfa/0x790 [ 558.036040][ T2867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.041923][ T2867] RIP: 0033:0x45a679 [ 558.045801][ T2867] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.065384][ T2867] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 558.073787][ T2867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a679 [ 558.081740][ T2867] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf712 [ 558.089690][ T2867] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 03:35:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:51 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@euid_lt={'euid<'}}]}) [ 558.097649][ T2867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4e9e816d4 [ 558.105915][ T2867] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 03:35:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x1, 0x0) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) socket$inet6(0xa, 0x4, 0x8) 03:35:51 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x3c00, 0x4) [ 558.217808][ T2880] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 558.245642][ T2880] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 558.265821][ T2885] hfsplus: unable to parse mount options 03:35:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500154003008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:51 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}, {@uid_gt={'uid>', 0xee00}}]}) 03:35:51 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:51 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x3c000000, 0x4) [ 558.483386][ T2911] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 558.541050][ T2911] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 558.559369][ T2889] ISOFS: Unable to identify CD-ROM format. [ 558.584479][ T2976] FAULT_INJECTION: forcing a failure. [ 558.584479][ T2976] name failslab, interval 1, probability 0, space 0, times 0 [ 558.611022][ T2976] CPU: 0 PID: 2976 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 558.619289][ T2976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.629346][ T2976] Call Trace: [ 558.632649][ T2976] dump_stack+0x197/0x210 [ 558.636995][ T2976] should_fail.cold+0xa/0x15 [ 558.641603][ T2976] ? fault_create_debugfs_attr+0x180/0x180 [ 558.647430][ T2976] ? ___might_sleep+0x163/0x2c0 [ 558.652294][ T2976] __should_failslab+0x121/0x190 [ 558.657228][ T2976] should_failslab+0x9/0x14 [ 558.661717][ T2976] __kmalloc+0x2e0/0x770 [ 558.665939][ T2976] ? mark_held_locks+0xf0/0xf0 [ 558.670686][ T2976] ? stack_trace_save+0xac/0xe0 [ 558.675523][ T2976] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 558.681225][ T2976] tomoyo_realpath_from_path+0xcd/0x7b0 [ 558.686755][ T2976] ? tomoyo_path_perm+0x1cb/0x430 [ 558.691765][ T2976] tomoyo_path_perm+0x230/0x430 [ 558.696593][ T2976] ? tomoyo_path_perm+0x1cb/0x430 [ 558.701603][ T2976] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 558.707681][ T2976] ? rcu_read_lock_held+0x9c/0xb0 [ 558.712876][ T2976] ? rcu_read_lock_any_held+0xcd/0xf0 [ 558.718226][ T2976] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 558.723496][ T2976] tomoyo_path_truncate+0x1d/0x30 [ 558.728505][ T2976] security_path_truncate+0xf2/0x150 [ 558.733776][ T2976] do_sys_ftruncate+0x3d9/0x550 [ 558.738615][ T2976] __x64_sys_ftruncate+0x59/0x80 [ 558.743537][ T2976] do_syscall_64+0xfa/0x790 [ 558.748027][ T2976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.753918][ T2976] RIP: 0033:0x45a647 [ 558.757799][ T2976] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:35:52 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:52 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)=""/131, 0x26a}, {&(0x7f00000001c0)=""/39, 0xfffffd51}, {&(0x7f0000000200)=""/120, 0x78}], 0x3) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x200040, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) socket$caif_seqpacket(0x25, 0x5, 0x5) [ 558.777381][ T2976] RSP: 002b:00007fb4e9e80a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 558.785775][ T2976] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a647 [ 558.793729][ T2976] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 558.801680][ T2976] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 558.809642][ T2976] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 558.817608][ T2976] R13: 00000000004caa00 R14: 00000000004e3e20 R15: 0000000000000003 03:35:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500158003008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 558.897291][ T3006] hfsplus: unable to parse mount options [ 558.932950][ T3015] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 03:35:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015c003008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 558.935662][ T2976] ERROR: Out of memory at tomoyo_realpath_from_path. [ 558.941240][ T3015] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:52 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = socket(0x4, 0xc1ddb55e4b5ac079, 0x2) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000222a}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000326bd7000fddbdf25020000000800026334000900c659d9ef74a002995dbd988e0000140004000500000007000000050000000400000014000100fe880000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000400) sendfile(r4, r3, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bind$bt_l2cap(r8, &(0x7f00000000c0)={0x1f, 0xd4, {0x64, 0x0, 0x0, 0x1, 0x82}, 0x0, 0x80}, 0xe) 03:35:52 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}], [{@obj_type={'obj_type', 0x3d, 'bridge_slave_0\x00'}}]}) [ 559.128911][ T3125] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 559.241730][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 559.241744][ T25] audit: type=1400 audit(2000000152.489:549): avc: denied { create } for pid=3128 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 559.288826][ T25] audit: type=1400 audit(2000000152.519:550): avc: denied { write } for pid=3128 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 559.313619][ T25] audit: type=1400 audit(2000000152.519:551): avc: denied { read } for pid=3128 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:35:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150204008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 559.339370][ T25] audit: type=1400 audit(2000000152.529:552): avc: denied { map } for pid=3134 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 559.395572][ T25] audit: type=1400 audit(2000000152.639:553): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:52 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCGIFMTU(r7, 0x8921, &(0x7f0000000340)) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r8, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x62a4e9fc3caf2bad}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r9, 0x200, 0x70bd25, 0x3412, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x28008041}, 0x4000020) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 559.514582][ T3130] ISOFS: Unable to identify CD-ROM format. 03:35:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150304008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 559.562734][ T3138] hfsplus: unable to parse mount options 03:35:52 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x9, &(0x7f0000000040), 0xffffffffffffff4e) 03:35:53 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@barrier='barrier'}]}) [ 559.767028][ T25] audit: type=1400 audit(2000000153.009:554): avc: denied { map } for pid=3253 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 559.871127][ T3287] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 559.898375][ T25] audit: type=1400 audit(2000000153.069:555): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:53 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x8, 0x1118) 03:35:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150404008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 559.942249][ T3287] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 559.991507][ T3287] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:35:53 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000004a80)=[{{&(0x7f0000000380)=@l2={0x1f, 0x8b, {0x8, 0x4e, 0x7, 0x0, 0x2, 0x81}, 0x5, 0x3e}, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000400)="1c97b69fe218f3fffc70ae499d385acfcc4046b672359c214a4968e3c8376697fe9176375a5e88e6c544c40f28fe098197016df29c8cde95633a58541a8916c6e85d8272df6b5ef490b60efcf2c04ea466211749d8fe5d32b7b02fa186d5483c4e0a5418d8e2f9a645e5957160a671b047b9a39b1ab98c4fb82c6b57787e64885173a42f88da75c65847e362da344d7eb23aab90de63e7af03f0242cbe3749d354080a5f1ebd1f4adb6ac20f6c5ac629c491d5"}, {&(0x7f0000000500)="d21340fc0734a86d58f3d21d4881ef"}, {&(0x7f0000000540)="7f16f4e28c517b42c6c636db9f05595010bf7d6be8554567cf412e5ea729621fa2da385574ba2a0845016109c039e88881d5cfe99999d5a123a8425225c3cdf7bb40d153fbb5cc06cc5823080eb7949085dc5422122e1f09cb10c1fb9d11c22acd0905df44e4e737e7c303d56dd1b2c691fde029103bca954880a5cff6a762f6e9b60cd398edea07b61c921e0ad6006e149745595ed7eb62cae5cc1bf1c19c768cf62d23c3e674fcaf2c51b78cbb3e47b1a7cb9ba1912f04551b8aa6e907f65b93a2d67543b2905836df1882ffe694857bf8009b507d1278be2f811e696340dac2"}, {&(0x7f0000000640)="7a26978bea86d31ae1b86c2f6d4d0c2be279acbf108742a3b317f6473920cb11b3bdbc0375905f8476ddd40458e683ae0a29cdc0098bfc20463fa636f3d5d3eeab40fef04b78dc086b433d00addf1ae309018470b12e22f622b151686303fce389324772158a3b0ea95cf99bd1e8dec3836ec0122f954083b6688ac1183a1b82ceb3f02610f9e9419011f1568726756c8843d2da30b47c71f254b86c4951347e0b4e74064c5a7ea2ae40cea780f32530a51aa1069f6dbc7437fdd5fddec3e1e391b9a7b7a2109b3e518ee2e7bff5d9f55b2a7d728d2663ab1614a2038c75b6f399aa13c606c30d2733"}, {&(0x7f0000000740)="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"}, {&(0x7f0000001740)="67ade01e4bfb4e7dab7a3fef1bb9996a84e263827eb7ee3b04b4bcce955108fe5a3a0d0029dbcffacd5293e2914820d7f1d461582f29cb1129df02e3b593400ad560113596f276bf201058459d776cb93a655b8b0d8fa79444ec1a2def5c866b1a284857e16599ed5e986a8a8dce424b83fb308c6cc7a5e359fc108263"}], 0x0, &(0x7f0000001840)=[{0x0, 0x103, 0x6, "9c4d5f54a2dbe74fcd01915f8fcaa9bd605b8a47933a0e9d51c778bda78cf2ee65f27f3c4a394802ea2ba1b6b3b95d4a8d05644efde02835783033844b0fe9eb8562316791168dac7599f59ed41797bfbde33ea6caebabf332605d6b87b1f0"}, {0x0, 0x109, 0x4, "0688337352dad7e78b1166c8747a0c746d1378aa27bacc01eab4a4f52a31c92b9a1ad0349535eaab96799430a04016cad2"}, {0x0, 0x110, 0x101, "af3ccbefe05459c061b8784a798929aba94119ed1d4dc186c98d25815ca85536656ff5413ec8becd484fe17897112ecc1985573b121d0a751cae4f71a642db6cb39529c50fec77e67cb1977eef40da4582bf828a30eb1463e805c912046a69b9046fee6ef58281b7115db37551e332c497244119ef606d845569dc4fa2a0cf085828a0e5df754aa0ce54cf7dfe976e033183d5ec1baab0f098c40e347d940569f8c2aa8f1670f401364638878561bc6b4251654dad255cea46"}, {0x0, 0x100, 0x7, "2c59bf67da825b024b6789bf2b30d023e541f8f551cb2aedfc821cedbb37182178e769f609f5f417814bbc9afb0a178c447638c9ca115cb41e851c0455113d2c353e4b2250fc009b9094e5c686db5eea48d2ce1f5b7376ebf348c30e6383a98dc80dc9ba88c7d90a8d2f3dc6a132b3eca0bb7eb8da87e1b9655bfb94ad8407c15cefcfec9fc624adaaacb3430548828ff718a3cf092f9d8989525199096f4ed1ab6a33cfc9f7280f9e73159fffab7a2f0e7e4dc81f2e7d16eddaad6e3f533fb986060a8d5c"}]}}, {{0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001ac0)="f8b06df216fe7d4affd76e109f53792e24dbcad7672ee82b2c145ddf0cdfb771a0674baf04499da732cd60d39498db283ca3bb1053f6ac3cef06a7a6a820662d92047c1c983dea004b5ac9e84e8287b2c3072d1afbc49bf5b2539c582f524b7ffc16f1b04854fd3278dff47b5748e9dcd227a880b181e24a4f608acf3ff3c45007af49439e89a0c6fc1270228c464780da29950d64737b4520f9335a01fd5911388870f716a141b8f07554c9c3bf312468f76b5e4e0771f013eec4327733f98b9bd4c34ed93c60c9203e69de6a0320376df3421371704c726330c2a7e703127bfc424b883ceff82bb998"}, {&(0x7f0000001bc0)="6c46c84c056fa1bc6ed73d1b106f0ff6aeff097987c5ab7bcba4107fa90a304c7b3a5357ab4697b826ebf5307c89068e8f935474a69b4c62971afc8f141926f21149212ba5d73a1dfacc1f5f432b1448e67b0eecd4c8fd29435719c0447084f64ac03535eb2d1c0277b335a119ae98654c19f6b5f58b0207176f4ce64a18aa8dade751e9f5d89b3f5fc5f133ae262d02dca9a54815790ecd5ea73f3496ad20eed84bba2ed2800e6ff748"}, {&(0x7f0000001c80)="6e736df3cf06ab0afab8f3a66b7197ec242057841947cd70a09270fe0a37c1e5696b4a0f7bcc20720ff7a2c43f3bbb254a7951fd50fee0ad12ef841887831a1d3e046effe8e6be48512c5b433f6bcdd7a7ae9b30c721df80ebd8504ab8b3b3817261aad9a90d697fb95b4278ec9017a3f2297551a993b6fd8f86076b9a90b0"}, {&(0x7f0000001d00)="daf82e7d589f2ed58ed0c9bafe5f19138fe1e12c5ee3f56df8cccae9c6863d29c56526e921d72006499c47943f8dc141012293e94d40148183304de476a120457b6d34b8e6a3dd431a7fc2b30d102a4eecdf7a3dd17fccf231ef429c604329248a451e87b834a4dce5dd07f7bf9481bac5de04e6490325cd04799b9646dc3d55405405ddbfabef184c5af793616a67bcf5f4a5930ed925f57d8f9c1ec434455472a303165dbe20e9e76d318217b660c0b433ec4ef4c9f2c1"}, {&(0x7f0000001dc0)="8f9b45f4896d164d58ad2af0b178"}, {&(0x7f0000001e00)="968a3fca4bb67fc2105456b59fd78960650032a8abf442ffaa4f78027a9202a828084a3620dcfe1105d5de0763b468ff7edcd66a5d6edd4568794c69c26835bbce1a2439bbfb309c719ab29f46db422debc1070117a25dde6ea96b325cf1f784811da3e7950c2e73ee9078dc7421d963a5ae9db7f0002c0c7113eb8f4d2741cd8e81d16c"}]}}, {{&(0x7f0000001f40)=@l2={0x1f, 0x0, {0x6, 0x5, 0x1, 0x4, 0x2, 0x48}, 0x0, 0x7}, 0x0, &(0x7f0000002080)=[{&(0x7f0000001fc0)="caa041ecf1bb11004f105b935bdbb660349f018a3bc8ecc7f190008f98ad1003cd080eeb5b889adb2c0cecdb8268dcdfd20159f4ec0b355a6049ac5f65303de3629d5dd934636dd7bf1f20c443264966e262b8d17c2b2d3960a8c12c800304feacbe1bbd2bcd0a0d495c0b49214c8a218a2cc53b0f704be2e80084cac48e917394459ca81f8314cc81cca3ef2425c9562767ad6dbef27b68d0824aeb4fd80d1f9338a4e1efe4c2c7"}], 0x0, &(0x7f00000020c0)=[{0x0, 0x10d, 0x101, "81bc7c14a4ab05f47e4dc13e1997f3a7ebba5460b1f10797d712099a94e20a019af2fbe8b8f2145d39ac65ef331a2b9202ca6633c074534aaaa69abfac91d1d9dac4fb5434b259eea32f815cbc87214c96b95e1e473cf3fc2caa"}, {0x0, 0x111, 0x6f3, "fcfbdca2d4ba70dfa630e27152b49ca9d85fefac824cbcda558c0c1c4f883bc69200691720e1ad21b012403d50a31ff9b2f8a941a2432238893adc39bab70a20649ea636689690271a4686baa0548eea6bc0f4a164aecb04f3008ad8f8290d5591de932d30db99ce9035c9563107e17aee5227c832ea9ce975d54506db338b691953c33eb4061ae8e32ce1f461ce81da17d86a49b767f2433b7867e56de5ac11373b1a9773de6f8cd65dfb4f7fbdccb34f2b9e2abf4f1e6dd1af4f6ebd6030cddd013481e7dffd5c566a5c5a30a3870c3996f4a7968ba4b5dd3248a5a960ac355a4bc149f89d1b3a3d0b37b5f3d9b6d0fcd5383bafcfaa1899290ada37"}, {0x0, 0x10c, 0x8, "4d1c5fe1abc12ccf8bce68bc9263601e9d1a3c99e8e646e533bf913d6ee071302aa7841658082239b530ae363c7e6a0d3d9172e9f23bb6de0aa27c99ea2d93fe3438d84b38cc1692c181983ea7c1a45f7dee0cd6874a39029fee38c8038cbf3666e01f0d77b47a92ea3463e0ed221de7ce28f07e75b697381e5e51f085a1664e0ac035f566cb1e5ad4d0fbb57c0f3031482143d4a221e1d185d8c496"}, {0x0, 0x3a, 0x87a, "c167dfd3834eba6ebf5d8019434b5e27e4713ad2dfd33339527bf25ee185f9230569e2eea5d279c426eda7467f7c942bccce"}]}}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000002340)="ec16ceecb9653fa5fd7ca00d35fb75bcfa884c5a9edeaa4e4a96775547c35204547e6a8b298984c2a3beb740fb4a9ee70f5ac964b3402cc47aceabc57d8cb1a0e4a2cda95a992fde662cfd1b71430a056c806b8cbb7b27595f2f92f8068c5ad34ad0073977aadb374d69cd1567c4cec7bd58a978d6138ebc5d3b1362"}, {&(0x7f00000023c0)="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"}, {&(0x7f00000033c0)="aaafae69c578ffdcb073b08b6012ff9e3ad4d22c7f9bfad22962756d3d26f4d1286086f5d7e0d1720aa60b30aabace4b1206f75c9186317d97eef45fe8e69ac491107e646e195025d28d2ac904de25811101fb6f6c7ff8d5da907dffa44776ee44f2576c9aadab22215fbc78bad293337cf23fb56d323c272da076dc9490c630839e9d5d209511e8d568db85ff5d873d4f4f2ce2374922d555460cda83a1832960649fd1ba5c9ab67d48fd6c75b093b1d5dce72e402c375d08f54ea364e1b396776cbd5d1b9e8b266e432047cd1ebf4719ebffff16e6c6e80700dcbe895bb09ec5277a68773d94a8b615fc74432ce0eef94ee9adfc71a3586f078345153a9f05ba73fe901bc615a8ac91651f3dd26fc91db3c8c8a305ef6c6c21b5443ddf16be8a211e07cfd41b8e16117b0f9c8fe74062c0f6709c52934e84c2f5703c22c066417c21855c225bc71b81a99889ee3170493fa6ba07e61584724ed1dbe443824552498b12f995142e99eec4b6c2270b299e1d4960a6ec159f3303f361937c09a3722cbf4f05d526cd260e8feb600ae56b693961fadbe73f2a2004d1854f160e81398d0250f67b414c04bbc6424f89eef515ca85e44917f95fef5b019d0986afaa867483e1bc0e59af39dabf6f50db84bacdcfa154fc86392e0d3e49e68a4640c9bb91e0900bf0795e6219bc13af33f08a7bc946b11fef5b8c73353691e6e08990eeafd0ed971b25fba11d81444179e8e893d9009e685d9c2681542db58caf58865877fb080833eed8a3cee748ba89b9b4534bcfde1258efa6fdaf50a3fb361537066623dba77cc036e869c32c6a57422ba23440c34b2c3da4497773dd33451edb20f8a96c3207c3c6f822da31ede3e1bd1a25760baef4673d910e5b01ddb7f9338924122140785f20453f349e1c61c71ba9698851d63752bdbb1b6d78d1fbcf767ce79dcf142c0c11b74aced56475981f8335fc6ed0ef501cdc81ba6a8ac57832e76d372092f53a1bbeabd4bc709cb92c9cc62af013f936864fb0b754ff160c08596a2dc1ea0e6e0e96e9c4494412849018e87417da2ec5cfa56ff33fb5325d51ef1a9b010db9a5d9d571a2ab4179915e6cd6de111acf792ef1f0c0e626f410605451361b3cf3840a6aa19bfbd34cf67172577711efcf1cf5d9808d71a36b277edccdb3461ba600a6bcfa2493d0db250f85ef14204c4ad52f3e6baed966095dfd9ea1c45c8a61d5ea35ae97b1afa30e3b8ee9c04d71217330e7ad66181004a16cde382d45dfc9827e4f0d1df890c4f75bf48095af73d4c6e3e23aaf71c1ddc80997cbeee57331fe6d3e65b3f767026c18b622a1a5b62ab17f608826b219e7bbeb690f47f503e41dea0aa1377d9296ef175030cddd0ca7946e1fb20d673979402c585b1530c539c65c95df9c185fe4827541ba6509a829388f13686f13605294bd1d1a396a921b7aca8a6bb243c9a327721c74ffe51806189435d60fab31f12318d3efb79a20737eb208b15f10c2aaafde2ff6a533a276219248b48826411315b20352e78201682d7e0f96943ca594f6a348237ed235763374dcf28b0a73596b13bf56ddab3c7146774dc0aff0524ff1f0d69e3f2cb92687563f62632360082a66b28af1c98160fa17fecff521a1cab8f5b7ae163f9dce707f2e9fb0182ea6fbfdc2175b3d2c340bae4da66619c903086b3dd88e3a11b1d548e5b242e63c85de8c11608ed4ac79f0a9a13ab91496fba5d510df1af5e96b22aff966a214348bca793b62510e566cc8d9ad545029c90095ea95e1aceb6718f6827703586e132e5bfe5ddf8a7a35b53bf0dae13ed388f87118f31989095ae338574c44d63c0841d60fe0539591da5322d74009938048eb1dbfdefee0ca9456facd63bf065f27ceb309495db790411184b87b0dfecc39c5a32d9a776ac1b0c738d2ee02d6496e02e5e5bde4248b8cdb5008e67e9dcd8305b8d8e99d68f77bb59f37670da6d6e463af46420dba7c203d30f2f7db5d377057799cbd2a9be0989d55d4978b41998dc94895c26bf431e59e742c79523380f454b680edd738a7870163491afc7fcd232601a70c0134189be69c0af67d63f28a4bc16d76d1ae00f620aad8560853ca183867830d3d24fabf6cea72bc165e33d92be7bef9d112c5e31c50aa145dc5110692092db584c6201c668635e72bfabf717f471220ff8441a4e6349b78009457ba44e4db273a0f8cee78cd42f884c169d3f7582640ad31a2396fc1418a4d70ccfa8917761bf32ea6035bb290adffd76544a944f5c4af665fba7aa09820ea205e1ece83c148d3e2fddd2b91c23ea0459fed96750159bdc93d92a56f85dff629cfbea71d8bc7a038886bf967a8e8c61e69819441df3ce7405df242cf79a67f029f4b85097defa5ac9d49c51c646a2bc8e62d836c91b8413d29a81913511f055da7d95f6775d7ca837419cd79b109caecd21c1517d8454c2dee3e233ddc6d59a1c4fab4b274f7679a2f60f037a9a74c29f494d12d1e32237cc2c82fec18126c2f8ddad429aad6540e3ef9eecb9e517b778e150ffd470543bfd8d1f2ae6be72a1237454f0c5873afd331bb958fd6d632142a525f19f5ba4130f9f81127c6a99b98f6f59d70948992bc870e01496f95db763acd8f73ad57c8df96bffadd2a93056deb94a0a8a1d54f299c14f56a7a795ebea95790e676dad1dd3de01582de0615dd4ee1c3a55555ee4ea490b57caf8e737772badc67fc89a86bccde66c7ca68ee264638349e8b3cf478826e77fa4b86a44c3c65efb3a3f55a675d6481980b67407436e813682a75dccdca05f822facfbdd2e1ad913751133fc2fe29b904e0bfb0a0d136cc5c59e500c84e2b6f1534b7cb91111b7451709e924833cdb6c4cf35e9e5b6bedd66f089265462603d5c666b45ec23e1915517810efc96405d37e59ad1489ab517b60a483a5c5bbf6efda5e84a1d9c8307bc832a21b0c952656de6de29fc2d62bae32632df3bef65e283e3dd07cf7222dd5b6a669b579fa35eac5dcd5bed7dccd6bc28311ee8fcfc452fc5558dc5de6bdbb3c9a15990cd824991e27b0eb679ed3b6b0db1e95ecbb5ae587b62c87eb04639eae5038690881352f607fdff3f71fbd25282efb84f6e2791f674ca40546aef7c2a623aa35432fc0e0f1b36a7036a0ae9b0fb77d7574589f644d7abaddf61cc5e15c2e73e1a606f757e02f0f88c9088cb1dfff24bc82ef79162eda7dd19216678ab9941265dba90fbe9bcb4ba6bdc9624f241154b3092f8ea1b2ffafdcf123a2a6e1f31c750fd7c748e7b6bc8edc68349062ce204831663ba0f41af86a365afcceffc5676289b7efc4a6bff890e1851357bb3ebc55111ba8a0e1432081e91ff90d81549afa1041f52fb96500d95aa464b8732bf74da518d6ffcfed844e9028dca1dc26cf0f7b9eeabb116f067c50a2d78332678748b4b63121f6815903809d90730264ee2e256dcdc750117fbbe744eb7ce7377c00d9f8a5cc28ce273390c016e7faa4acf4e0e6905bc897a372ce80a971effb1633f68286689897af4515afbf0608acc5414385b0bd54aed89fbc12572b46ab136e3aa15eb240c75676b476defc7a7a85d18a694bf5ccbdbce2452560403e88db9a8cc328a46706100f6d1cb49c8e79b7da8951491f5836f6f33b825a255e4fcff9155f69e6e5e383eaa9a57bb9b196ca402acd0689bcef25057d9310b26d4fd1ec4540b94310236909a2a8ca3a5194633f81ec77f5943fe18bfdc6e6580623c9e1202427bb867dc3c31773b9b620941bb0a1bafc55597cf20de9f1943d466fdc94bb628eb5199610d044812e9fb5e48293eddb0d0f9fe9112bd9bc3bc2d63058ad1483960c05309e76de051a921340fcf5fb1fe36ba8fe7cff106e3be97b1c933cb4b5398cb11173f1597c3bd61bf594231c2b2b9490497306d3f9666fd11742b1fcae6b38737136c3942fb0f57b7f142bef6fd0cf3220bb4d9661ac072b75ff7cc40378a34260c2f3813ce80673d8be1eca5da41a67c17646b00ba7b453fbef3c2318c5869a1304fd100163b653c23165f00ca74a05e57c5ce326574ba8d6534d2fa3e325543ac0c71bd52dda467fb5bd9544ff451e5bca26c314e7ee5bb6476c6f108e3ae5441cd2bf907dd84b22a8c9c8f76d1f7242fc902b4c042c8440ec4d26ed6be07051d72868e6b09402bdd2664cab3725650237025557e8d9de623993af968bfe52c06b0a3bc2b9cd27713a78ff09a35f610609f91b32cd8dce0a9ea21ed21fb3592d3d1d27ed1018004a2c0edb9f704afbb79dc4a4310f7e4d934e48d94d5d1215f94d03a4646c78c4cf35681fca65cb59e32d1e087f9c983cf77fee14853bf99d59645c1dad49a6abd86ae053546f314ae5e381843abed7f19a1cb4a140b64cb207169bf66f01a061293d32b1d3d61a3562a2c10f773caa5167206c075ecef8016c6c20c3c222d1b62ea7ddb67b99afd3111d05ec7c255c63221a4270cdf9664b2e6b273377b176680380d0bda82fe661ec47586519c5cc180b2bce2922de42f2f62d9635a6f5b5b35e91070a2d7718cf955754cb79992de3d49a17a6f5fe4748de0be9ab2f924a6e31a1cb80179c103e344c58d1222acff0e1626aad16c539cd24d9116cc4f8ee21d9cb406d0b2769204b3b271ecc2a6687ecdee7715a5489e10c97e245c2d0b552c0273c23e64cecfb371526bfd03732b92d6c59fbb5d67afbf85a0b231311bfe939ed7b0e07f0d4e80a5874ca5986c4b33f051fa59ce11052bed74d0db010dacd95bd28efcce55686251dfa855cded2c7a3db39e12d1c598b6c2646e0b07ca82965831fdbe81e0118ccb9f2827fc95e47b59b7be13f1eec10a614ae42c48299252130e49024d86137c1652b22db3c0562573fb3f9733ec9f966e95759d8c0199e59711bdac06ce4386f5310cc9cf2ae8c16abc0bafd42db43905c6339e953ef9d99823f6ca64b0ca302f4defe931dee00b59e00dc1e4281544b170bf94f0a75f299bb2b521a36378cc9c5046d60e17d3f0e16e23dc8fba7cb0773940ddf502d145a432b92a87fc98c281efd4a3e9caf279c63d6c2afd4afbd663150f9799d6eb3f3965b63af153770f5e1753de0a0efca87ebfc4d1dbb4a0225278061da71970eef4dd0bf25e7dcd7f0738b7e0d3e5e6e1bee86763ceefb4fd338b26ee1d593920d0bfb0456e8764cb88a2ec68d58a9afa953a7a507d1ab6a7d28c7afdc167526b295fec0407059c1f427a8d9019c742331d5d22556619a685e5d5b8a348b9d3eaf89f197df9d742c9c27f8de96832180ceb5787aa9c87e40a48016d2ff7eb8dd33f4523c549d25fc509638ef5f45b701b7dbf2fd661c863b1e3a3856b00975f191865bb90bf4a46dab937c15bf1b22811e57d44e305d293dba600abb6326a4cbd015210fa4d1cb3d126c3f1d96fd33f1be71ea1180ffb8a79801ca1cdc790ae0d957e3ee5ec012d409cf028324498e40165e437228d8d26c5a174e4a26dec2b985d849077476eb853d4c464c9c30f973edc6bf3b13afc8e96fd2c94e4ec2911e9548127cc329ea3264f9e892a6248ec10e6707b0dac1d46e96b3bd31d83d41e38d2451af95ecc9b5b2f1e3212690d9a43bd24b9ba160d308a9312558e9dc6a19e06ab5af1abcf7cf8648e2b86917533109e97b1ea42918d042d308b94b4ebc8713ee916088aae13afa971296ac4db67e68afd5815b30adcc00fed90d61f86ae8429c7c17d5c7445790396d0382c57bcd31458fdef7c5ee1b56f2fd54d5d8b97bf23a32a4bb14959880cb2c97ae11b2cb6"}, {&(0x7f00000043c0)="e5"}, {&(0x7f0000004400)="b8985a62861868acd83edee905c9da2cb9c67005d3aba79b08eea240230d0245deb05b8518d9a3c280b41a05da86065ac215e84bf3ba41dd0d0780612031c31e2f8d14a159cc94553b7095967aadd3bf0f85d1cf7e"}, {&(0x7f0000004480)="d826c0ab25162d74063b5e3623004e8725769daa6c61242da501bf19de2c7f7d9cf89616f6adfeefeed3363cda2bdafb8f21c8161738e38c38c24af3297383a75f876d0f29e05fccaf848b7d48e0cb9604d04edc2072a65d16a71a99611f4ee55eabb83a93234056e53c236eead1174791467702601b4f291f3a9d7daa9e62bacce24c1c289603fa2b4fbc3919f2ff41b5722dd5f6c6be28a334fc183d7f75978317"}], 0x0, &(0x7f00000045c0)=[{0x0, 0x100, 0x40, "fc9cd14bb786c85e1c275056e288842a976eb44ace2d8b0f5c4bdb066b0bc0b46da933ff6e54dcff1671b777ca02b4a8fef9fe0aad19e100c3c09f7d5d06fede5f187bae3de59544f37eee102d0baf3c5a11aea676374d3f2b279e960e5dec385665a69826436e10f76391"}, {0x0, 0x3a, 0xfffffffe, "e9cf1ae56287cb5718da21890e5e646652c3b23800ffeac318d7fa14795114c6798964572fe052856dfce0ae3941c783851c4e0db5df91ccdb7c744b5b883db890c8517b381c353d87b8a3c6b19860bf9c86046f36d8f76c5a04b5ff32186d4bd9bd32902b1a703f00c1783c3dc7f713fc5eb97a42cb8e250fdf4c2318188854c356d4bf91cc2848"}, {0x0, 0x119, 0xda, "e4a69ccd55796955b184559447d74cacfd6fdd910cadf159eb11bf13a68fa62d84075d27ded40c6b99af5e4f094c2febbf150261c2d84b2844b05407a1eeb38c3b80998abd77ea61fda3b1929d2d9e55050679dae4ee1a44177880a3f113b031fa4a3ea966dada9689b49a6c221e6c7d7b6a1d7e6504080f88463e534bffb865d81cc8a864205b82aa40228296dfd85391cc943ffe886d918f2724d3d6ff5b34d5dfbff55d94bd8cd3506f3c8ac17b8430b52e"}, {0x0, 0x117, 0x3, "91886b59649cb2da804fbabc5f974fad6fbc404962b2f2fb7ccccb176afbf9849c0825ba9f9e189f872f87651d27c4c280ea36c32296252adf2e29438abee56a6b706d20b01a0ea7928ea6c1d717cbcb8320829db5bde35e9bf16bb5cdd4"}, {0x0, 0x119, 0x401, "0e818215b93ef64ce04776079edd5002e2615f6e86f33d4947293f8b9ae4d98298ef1646a7aa2b68954da1ee88f5b914bcacb52979f1ba55eeace88ffd047b5dcf8ee6a50cb34e5f8c376655fe5ed4840d96f708776b389023f5466dd22763fd061a365f1f540ebf57e33623c786c438d631e725b7c7895dc664bfd7447c59991c37055e71130227facbe33dac2db4f96324f993de4c82250cffec9b7e06fcffd956b045963b7877eaf225bbb58dfb095d1920c6e91260a7bc403325cacaf690461c2b317583e8f338060c240b157f3569c92da1ade0108d9f1654ee71a29e2b8ab181434faebce6a88a56eea2c64a59403f2196b451d0f257"}, {0x0, 0x10b, 0x10001, "3ce613a0e3c7dcd259d52b36d679951118f8708eabd69c177e2a741afaeab432dcc8fdda14518772705107367065fc8da4bede4d3bea6e43015f0ec640024a71513d66525e89799caaf6d548e14ef94c9b597ce494948d34d36a3f1dbdf44712c39a245039f8a72faa728c41b66e3d010d079bfbd87cc0e03e71263579e27ac3e566df63cddd99bb33979db195b7a94f85c3342245098da386084b8217bf65b6fdb900a1771d6b00820f0b872095"}, {0x0, 0x10e, 0x1, "d5e87db49d3ba25cc8ebb43988d57323523887206d41ff0875df1dc817c50282"}, {0x0, 0x84, 0x5, "95be55446ee1c2bbbde2475eeda1e13627400c2608c8221505159fd67144230e113bb90d871d94b4dfb28e7f1c9d4a450bcd3f82e07b59895d9154fe3d5891022e34b141fbc6f6ac53b7a4b9cf1f9d4d361e8a2f602e05fff8c90d"}]}}], 0x400000000000242, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r7, 0xc008551b, &(0x7f0000000340)={0x5}) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r8, r5, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:53 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, ':'}, {0x20, 'self[%^\'['}, {0x20, 'vboxnet1@'}, {0x20, 'ppp0}~\xa3$GPL):posix_acl_access{md5sum}!&wlan1\xc7)ppp1[\xefkeyringppp0lo!user'}, {0x20, 'lo,{GPL-\\'}, {0x20, '-'}, {0x20, ','}], 0xa, "9b62e407270bd168395d42a1a1911cfadf23006a357f361598f17007bd90061c93d3f4a917835b457500c157a47eda3b4db672da2a8421d178359387f456d948e97e168494e764ffee26087108d89bd477c3b7a8c898e97683514c82a066304e6c"}, 0xd7) [ 560.061305][ T3287] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:35:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150504008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 560.258389][ T3395] ISOFS: Unable to identify CD-ROM format. [ 560.285364][ T3401] hfsplus: unable to find HFS+ superblock 03:35:53 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 03:35:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150604008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='\n2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150504008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:53 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r4, r3, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000340)={'yam0\x00', 0xfffffff9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = getpid() syz_open_procfs(r6, &(0x7f0000000100)='net/xfrm_stat\x00') syz_open_procfs(r6, &(0x7f0000000040)='net/if_inet6\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r8, 0x84, 0x21, &(0x7f00000027c0)=0x833f, 0x2ab40fef) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r9 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) dup(r5) r10 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000002800)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r10, 0xc10c5541, 0x0) fcntl$getown(r9, 0x9) r11 = getpid() syz_open_procfs(r11, &(0x7f0000000100)='net/xfrm_stat\x00') perf_event_open(0x0, r11, 0xf, 0xffffffffffffffff, 0x0) r12 = getpid() syz_open_procfs(r12, &(0x7f0000000100)='net/xfrm_stat\x00') process_vm_readv(r12, &(0x7f0000002600)=[{&(0x7f0000000380)=""/19, 0x13}, {&(0x7f00000003c0)=""/70, 0x46}, {&(0x7f0000000500)=""/242, 0xf2}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000440)=""/105, 0x69}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x6, &(0x7f0000002780)=[{&(0x7f0000002680)=""/18, 0x12}, {&(0x7f00000026c0)=""/132, 0x84}], 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x20, 0x8000005, {"b1436c7febe55116e0f6094078d7c2b5"}, 0x7, 0x43e29b78, 0x1}}}, 0xa0) bind$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0xd4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x2}, 0xfffffffffffffd44) 03:35:53 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x10000, 0x4) r1 = shmget(0x1, 0x3000, 0x54000000, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/4096) 03:35:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150704008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:53 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:54 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x80, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x123) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc10c5541, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000180)=""/104) perf_event_open(0x0, r3, 0xe, r2, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000200)=0x4ed2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setregs(0xd, r5, 0x39c, &(0x7f0000000100)="07366445ed55e5f242e3d24e49e86ab005c8c7c2e834a1a6e4eebaddfab74fe3eb23c2a6d037419d302629061231e02adf5267ac61961252f211975751f3a992ea9680c3b32d47cee189e1") 03:35:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150804008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:54 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 560.929681][ T25] audit: type=1400 audit(2000000154.169:556): avc: denied { open } for pid=3591 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 561.072887][ T3575] ISOFS: Unable to identify CD-ROM format. 03:35:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='%2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 561.129114][ T25] audit: type=1400 audit(2000000154.369:557): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:54 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150904008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:54 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x1, {0x2, 0x0, 0xffb, 0x475bfd2245752797, 0x1283}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 561.348943][ T25] audit: type=1400 audit(2000000154.419:558): avc: denied { map } for pid=3607 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a80)={&(0x7f0000003240)={0x20, r3, 0x225, 0x0, 0x0, {0x2}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r9 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r8, r9}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f00000007c0)=0xe8) r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r16 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r15, r16}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1, @dev}, &(0x7f0000000840)=0xc) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = fcntl$dupfd(r18, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockopt$inet_pktinfo(r19, 0x0, 0x8, &(0x7f0000000940)={0x0, @multicast2, @remote}, &(0x7f0000000980)=0xc) r21 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r21, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r21, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r23 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r21, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r22, r23}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r24 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r24, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r24, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r26 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r25, r26}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) r28 = fcntl$dupfd(r27, 0x0, r27) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) getsockopt$inet6_mreq(r28, 0x29, 0x14, &(0x7f0000000a80)={@mcast1, 0x0}, &(0x7f0000000ac0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000f80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x840c00}, 0xc, &(0x7f0000000f40)={&(0x7f0000000b00)={0x434, r3, 0xd00, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r6}, {0x134, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x665d}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0xffffffffffffff41}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r22}, {0x1c4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9397}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x45e7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2f7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r29}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x434}, 0x1, 0x0, 0x0, 0x1}, 0x40000081) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x3, 0xc3e4, 0x7ff, 0x37, 0x8, 0x1, 0x7, 0x33, 0x9, 0x1, 0x6, 0x80000001}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$llc_int(r30, 0x10c, 0x5, &(0x7f0000000000), 0x4) r31 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r31, 0xae41, 0x0) r32 = socket$inet6_tcp(0xa, 0x1, 0x0) r33 = fcntl$dupfd(r32, 0x0, r32) ioctl$PERF_EVENT_IOC_ENABLE(r33, 0x8912, 0x400200) write$tun(r33, &(0x7f00000000c0)={@void, @void, @x25={0x1, 0xb1, 0x23, "b479f188fc98eefae6c51d90c810c8d90b156e7788f4fd512bc52087e0bcd0b06ff43f04d2557c30112278ad4685f450935cff2001573a5240222570de7bb7b304b7804c5eb26bd98ee9d18e08d6607844890dca54930698e7698e6d423877190cbc9bfb5890cfaf2becbf464c0bfa5fb79fb2b972bf41424adfe3e8f37f4e0e7c437b4b1e6856edc79f2cfd52ea0e95aef140ef40549374f4e6ade74c84a3d0f739ab0bbe63c0a79744155b1130a5437d822e27528b97996afe8786d064ea255b1fc72d5694d9c32d6ee9f9544602e3af25efaf111e8bd9cc713dee89955d1274a6eabd397ff4231444ac97cf"}}, 0xf0) getsockopt$bt_BT_DEFER_SETUP(r31, 0x112, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) 03:35:54 executing program 5: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150a04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='.2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x3, 0x0, 0x1, 0x1, 'sy\x800\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00c\xef\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x221, 0x0) ioctl$VIDIOC_REQBUFS(r6, 0xc0145608, &(0x7f0000000380)={0x1, 0x7, 0x3}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 561.643057][ T3746] ISOFS: Unable to identify CD-ROM format. 03:35:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150b04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:55 executing program 5: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000040)={0x400, 0x3, 0x4, 0x100}) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCLINUX3(r4, 0x541c, &(0x7f0000000080)) setsockopt$llc_int(r2, 0x10c, 0x3, &(0x7f0000000000)=0xfffffffe, 0x4) 03:35:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150c04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='/2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 562.061682][ T3855] ISOFS: Unable to identify CD-ROM format. 03:35:55 executing program 4: epoll_create1(0x80000) epoll_create1(0x40000) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_dccp(0x2, 0x6, 0x0) 03:35:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) sched_getscheduler(r6) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:55 executing program 5: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150e04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:55 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000080), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 03:35:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x4, 0x81, 0xff, 0x10001, 0x0, 0x3e, 0x1000, 0x2d, 0x40, 0xd8, 0x9, 0x8, 0x38, 0x1, 0x3, 0x3, 0x6}, [{0xd8e9caa9, 0x3, 0x100000001, 0x2, 0x400, 0x132, 0x9, 0x5}, {0x0, 0x8000, 0x80000001, 0x313, 0x7f, 0x101, 0x4, 0x5}], "1354a7b4c45637b322913046cbf4666215b6eb28983c84e64f487f8b069ada4dab39884b0d60a99cb5a89b5b3db2bdb6a838", [[], [], [], [], [], [], [], [], [], []]}, 0xae2) r6 = gettid() sched_getattr(r6, &(0x7f00000003c0)={0x30}, 0x30, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r8, &(0x7f0000000000)="fd", 0x1) keyctl$get_persistent(0x16, r7, r8) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:55 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150f04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:56 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='\\2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 562.821240][ T4040] ISOFS: Unable to identify CD-ROM format. 03:35:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfddf) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r10, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r9, r8}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000500)={0xffffffffffffffff}, 0x4, {0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, r9}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x10, 0xfa00, {&(0x7f0000000480), r11}}, 0x18) r12 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$P9_RAUTH(r12, &(0x7f0000000440)={0x14, 0x67, 0x1, {0x50, 0x0, 0x4}}, 0x14) r13 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r13, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r14 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r14, &(0x7f0000000040), 0x10) sendmmsg(r14, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) fcntl$setlease(r14, 0x400, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$KVM_SET_IRQCHIP(r13, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @pic={0x6, 0xaf, 0x1, 0x9, 0x2, 0x2, 0x4, 0x1f, 0x9, 0x2, 0x5, 0x7d, 0x33, 0x1, 0x4, 0x9}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x1, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500151004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:56 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:56 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:56 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x48) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x34, 0x3, 0x0, {0x5, 0x13, 0x0, 'uservboxnet1system['}}, 0x34) 03:35:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500151104008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x1ff, 0x1, [0x5]}, &(0x7f0000000340)=0xa) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000380)={r6, 0x8c, 0x4c, "69d3c19bf8587632f8073c823772debcd49f241b54f17009d9deef3aa264fd6fcff51039a0dfe17c41e7db070f32b3ffe6025edb91ca2d9b18862e3f081eee02087fdc270bdfe098659ddc02"}, 0x54) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000480)={r6, 0x0, 0x8, [0x8, 0x41, 0x8, 0x9, 0x6, 0x2, 0x81, 0x800]}, &(0x7f0000000500)=0x18) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0x2d) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f\nfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:56 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500151204008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500151304008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 563.558660][ T4268] ISOFS: Unable to identify CD-ROM format. 03:35:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500151404008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:56 executing program 3: ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000340)=""/94) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:56 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) socket$bt_hidp(0x1f, 0x3, 0x6) 03:35:57 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x9000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500154804008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:57 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:57 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000900)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bind$rds(r1, &(0x7f0000000940)={0x2, 0x4e24, @loopback}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) io_setup(0x1ff, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10003660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b8000000190001a3000006005b00e2000001e0006bf000000000800000000000000000000000000000000a00002e00"/57, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) sendmmsg(r2, &(0x7f000000ac80), 0x66, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, &(0x7f0000000980)=""/4096) fcntl$dupfd(r4, 0x0, r4) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x7, {{0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}, {{0xa, 0x4e21, 0xdc, @dev={0xfe, 0x80, [], 0x28}, 0x58a5}}}, 0x108) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000003c0)=""/198) getsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ocfs2_control\x00', 0x4002, 0x0) 03:35:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f%fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500154c04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:57 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000), 0x4) [ 564.098858][ T4451] ISOFS: Unable to identify CD-ROM format. [ 564.103955][ T4442] Unknown ioctl 19305 03:35:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500155a04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 564.217169][ T4527] Unknown ioctl 19305 03:35:57 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000), 0x4) 03:35:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500156004008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:57 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FBIOPAN_DISPLAY(r7, 0x4606, &(0x7f0000000340)={0x598, 0x80, 0x8, 0x8, 0x3, 0x2, 0x37, 0x7, {0x3ff, 0x2}, {0x8001, 0x4b, 0x1}, {0x2, 0x1ff}, {0x200, 0x1f}, 0x1ff, 0x2bbed97656210e96, 0x6, 0xffffffe1, 0x7, 0x3, 0x2, 0x8, 0x200, 0x289e0f46, 0x9, 0x1c000, 0x401, 0x0, 0x5}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x9, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:57 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x400008a, 0x0) r2 = dup2(r0, r1) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x80df46fb616e395, 0x4) 03:35:57 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:57 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000000), 0x4) 03:35:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500156804008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) r11 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000060c0)={{{@in6=@empty, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0xa0, 0x0, 0x67, r10, r11}, {0x6, 0x183, 0x3, 0x80000000007f, 0x61553a0f, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000002, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0xff}, 0xa, @in6=@empty, 0x3504, 0x0, 0x3, 0x9, 0x1fb, 0x5, 0x6}}, 0xe8) sendmsg$inet(r6, &(0x7f0000000440)={&(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000340)="bde3e435395dfa6a39c6d14ca518f5aa11626d4746e01dedde6982297f9c1ffa8d722992b58e07908d4efd96", 0x2c}, {&(0x7f0000000380)="3b134ed991c69e10593d9689419f12605e4b27d68cbeca3b254088332fbaf1d16385d2921f80dda624", 0x29}], 0x2, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1}}}], 0x38}, 0x4040) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0xfffffffd, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xb000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:58 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, 0x0, 0x0) 03:35:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500157a04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:58 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r3, &(0x7f0000000040), 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000040)={0x3ee6, 0x3, 0x96001eeac27ea49b}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x8000) 03:35:58 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, 0x0, 0x0) 03:35:58 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$unix(r4, &(0x7f0000000340)="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", 0xfa, 0x10, &(0x7f0000000440)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 565.464236][ T4852] ISOFS: Unable to identify CD-ROM format. 03:35:58 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015fc04008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f\\fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xc000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150005008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:35:59 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) rt_sigaction(0x24, &(0x7f0000000100)={&(0x7f0000000040)="c461e16cc0c4e3bd5c05353767ad04db441c003e430f0d1dbdf10000c4617f1261bcc4c17a2cd03e45c192a5820000ae182bf3450f58510ec4a1fdf382b786ffff", {0x1}, 0x40000001, &(0x7f00000000c0)="c482059bef6546deefc423f963b4630000000000d9f166420f38dd21c462090c21362643fc0fc727d17fdfc463995e7a5800"}, &(0x7f00000001c0)={&(0x7f0000000140)="c4e1fd6f32c4413bd03d00d06d9bc403995fa476c60000000042d8eb6fc461f95a240ff24b0f2d36c4e25d06d267aec48225937cf549", {}, 0x0, &(0x7f0000000180)="c4e2f58e28c422f19ea0010000008f084087f903f343a42500000021f0110c7cc4e37916b8f17f00008fc40101d42d03000000c46201bc6300410fae462d"}, 0x8, &(0x7f0000000200)) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$dsp(r3, &(0x7f0000000240)="0403bafe01dfe4cb235db0685dc064642dde7931d1b6500e5abaa9a1bdd7b8e4e96a55d4221650789d67e5799f6e31515fb0b0fb50cf33e404d1f4c71ac0c42fbbdfa7225caf154af3dd4b5db72106ed907652ce7446d7a75c8aabbd0bb2c1d56a125f51d7b9893e630724878f6945da4519be98a388f0ab13293b2175841f870bae0e44eaa5e4721fa531c696ac5f43bddfa63062ecf91b5e621a9a8b1cedd835a3261870bf33fd534639856fa271c6a9945141eb24cfe7e9a0e8fedad1d29925f56db34139d943da0e9c13d39331c29dcf1e48dacf16f5097c276d1f1666a4d13e760850d82517fffba9e1e0cdc06fc8e0c11a97073cc7", 0xf8) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_SET_TIMEOUT(r5, 0xab09, 0x7fff) 03:35:59 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0xfffffffffffffdca, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x4, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 565.892858][ T4943] __nla_validate_parse: 1 callbacks suppressed [ 565.892868][ T4943] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x29, 0x6, &(0x7f0000000000), 0x4) 03:35:59 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) epoll_create(0x3) [ 566.013360][ T4942] ISOFS: Unable to identify CD-ROM format. [ 566.040175][ T25] audit: type=1400 audit(2000000159.279:578): avc: denied { map } for pid=4955 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:35:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150006008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 566.111207][ T25] audit: type=1400 audit(2000000159.329:579): avc: denied { watch } for pid=13011 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:35:59 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xd000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:35:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2\ns\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000000), 0x4) 03:35:59 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r3, &(0x7f0000000040), 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) r5 = socket$kcm(0x29, 0x7, 0x0) sendmmsg(r5, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000040)={'lapb0\x00\x00\xff\x00', {0x2, 0x4e22, @multicast2}}) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r8, r7, 0x0, 0x100000000000002) getsockopt$XDP_STATISTICS(r6, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x18) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:35:59 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$unix(r2, &(0x7f0000000040)="21f0a9b9aeaa90bc55f771", 0xb, 0x4000000, 0x0, 0x0) [ 566.334047][ T5072] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150007008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:35:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2%s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:35:59 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000), 0x4) 03:35:59 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) [ 566.673267][ T5085] ISOFS: Unable to identify CD-ROM format. 03:36:00 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) r6 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r6, &(0x7f0000000000)="fd", 0x1) r7 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, r6) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="928d211d7ea93539f07b04a16a6978ea8a359213bbda7891140c3ba3c8b0af9556c5b4e12792786e58585a5826174bd12c60ae5dcfe8af473b218f0474a63de98d5b01a1f699058868fa88a80e9f9963aad1dbb81bdfd1f50d8adefb8f0f591556666838a7cadb217f10f65d3707f77b7d8c5459bde7b379ba890b2026", 0x7d, r7) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 566.729094][ T5198] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150012008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:00 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000), 0x4) 03:36:00 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$ax25_int(r1, 0x101, 0x3, &(0x7f00000002c0)=0x3, 0x4) [ 567.022386][ T25] audit: type=1400 audit(2000000160.269:580): avc: denied { map } for pid=5214 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2.s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:00 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150014008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:00 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000080)=[0x6, 0x9, 0x4, 0x0], 0x4, 0x6, 0x800, 0x0, 0x3, 0x80009, {0x2, 0xfa, 0x8081, 0x2, 0x8004, 0x8, 0xc1, 0x0, 0x6, 0x1, 0x5, 0xe9ab, 0x3, 0x452f, "1e402ad6bdc4faba55bc94e8960d5d1ea2a3842be4770a5c53f209bbb80882db"}}) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0x10) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000180)={0x3f, 0x1, 0x1, 0x40, 0x1, 0x21e8, 0x8, 0x3, {0x7, 0x8}, {0x7ff, 0x8, 0x1}, {0x8, 0x9, 0x1}, {0x4}, 0xe1e, 0x100, 0x8, 0x5, 0x4, 0x3, 0x6, 0x7fff, 0x0, 0x3, 0x0, 0x1, 0x9, 0x1, 0x400, 0x3}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000040)=0x8000) [ 567.226912][ T25] audit: type=1400 audit(2000000160.469:581): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 567.395045][ T5327] ISOFS: Unable to identify CD-ROM format. 03:36:00 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), 0x4) 03:36:00 executing program 4: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150020008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:00 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0x6, 0xffb2, 0x0, 0x3}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2/s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:01 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x5, 0x4) inotify_add_watch(r2, &(0x7f00000000c0)='./file0\x00', 0x240) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r4, 0x448caa80ea82c9eb, 0x70bd2a, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x28087}, 0x40004) 03:36:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), 0x4) [ 567.801062][ T25] audit: type=1400 audit(2000000161.039:582): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), 0x4) 03:36:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015003a008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:01 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x23000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 567.987585][ T25] audit: type=1400 audit(2000000161.099:583): avc: denied { map } for pid=5476 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150040008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x3c, 0x4) [ 568.171738][ T25] audit: type=1400 audit(2000000161.209:584): avc: denied { create } for pid=5512 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:01 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x501182, 0x0) socket(0x2, 0x2, 0x7) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2\\s\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 568.482661][ T5608] ISOFS: Unable to identify CD-ROM format. 03:36:01 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x3c00, 0x4) [ 568.580929][ T25] audit: type=1400 audit(2000000161.219:585): avc: denied { write } for pid=5512 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150068008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:01 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:02 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x3c000000, 0x4) 03:36:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150069008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r4, 0x5601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f\n\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:02 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0xffffffffffffff77) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) fallocate(r1, 0x10, 0xc6, 0x1000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r6}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r6, 0x400}, 0x8) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', 'selfsystem\x00'}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 569.179685][ T5746] ISOFS: Unable to identify CD-ROM format. 03:36:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:02 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x20, 0xffffffffffffff74) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x80, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0xa0000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)) 03:36:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x10, r5, 0x10000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) write(0xffffffffffffffff, &(0x7f0000000340)="494dde55720047d6fcd83c748f5f34fb2476b9167436542317168be3776f3470ec3ae2e221f0c0a2875d80b5c50d5d8c7a41ef43032f08ee6d1bcfa9ac07e6adf10671b6818a93e8bc9bd9010eea7f89bbf31e4f8cb9a261a3bbb90fc97cb4f89658d416d7bf6a151b7af61e06088946dba8f06637751131bc5a05192cc6ff7f21f0d4deb337a27b870c3d195a7008569817e1ba5dbfdfd533f8ee4692f2f274db2440296a5573f1e12a401b4db7f7368df9b9d26071e1f4d6775fbc4dcde7cf98e16445e42197cb5b8667893d8b5252dc75a21c5b7e67570e85e556df157f177b73c12d60ef61e3e5", 0xe9) 03:36:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f#\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 569.580655][ T5880] ISOFS: Unable to identify CD-ROM format. [ 569.593670][ T5891] QAT: Invalid ioctl 03:36:02 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150003008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:02 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r7, &(0x7f0000000040), 0x10) sendmmsg(r7, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0xd8df00f9221234e1}, 0xc, &(0x7f0000000480)=[{&(0x7f00000003c0)={0xa8, 0x30, 0x7b3b3303b4fbb4cb, 0x70bd29, 0x25dfdbfc, "", [@typed={0x4, 0x29}, @generic="a9f4ac5422b6b4e29a221943c0c15b298b631a1d13bc516fa431a927800e8898500e7be235589739fe6a4f4e87abcb81dc09f482d97b659fd17bf12c3072c7e905bc6f2e50a50c0a6a1b22fd95b113b132790d2bfc656365e2411854cb1db0abce001134a6617bfd2924895e3de2abd3c77b20193fea18296fb3f80a120ba0", @typed={0x14, 0x1, @ipv6=@remote}]}, 0xa8}], 0x1, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [r6]}}, @rights={{0x18, 0x1, 0x1, [r7, r3]}}], 0x30, 0x40000}, 0x8040) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000300)={0xa, 0x4, 0xfa00, {r10}}, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=r11, @ANYBLOB="f5000000c7bccb45a2a7ff2c2559731f19d9daa83a1bb7602a4441833a43f6b9a92ababeb9bfc45bb9c852b234036000c4c8c59934fb8022dd7a4f5751868eaa4890ff6930d2107e69ffade0f3110c66bc1d7912797dc2927611e596ee78474cea7a7dc83d281a97e2525637926620e09c586684fb1a53d8d8f6db5585b9c710b9626e81b1a50c16d9158dbddb83bcaf0d06f870c3d037e241c9e7b9a19a518b5bf3306d8b47a5714a1f4ba452064f84f7d9deb2b06c2fbab3438406c4cb3f0173c763daf6952e7701000000000000001cd44e3c46593878cf3ae2311937e85775f42140f0f41683e5547af382876a763d75cf17de9fb20bb1"], &(0x7f00000001c0)=0xfd) faccessat(r2, &(0x7f0000000340)='./file0\x00', 0x0, 0x600) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r12, &(0x7f0000000040), 0x10) sendmmsg(r12, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r12, 0x0, 0x480, &(0x7f0000000200), &(0x7f0000000240)=0x40) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 569.737798][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 569.737811][ T25] audit: type=1400 audit(2000000162.979:591): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0xcd16, 0x200000) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) fsetxattr(r6, &(0x7f0000000500)=@random={'system.', ';I2\xf5\xbaNl\xcb\xdb}b\xb8\xdf\xdeoB\x88|\x7f4\xfb&\"K\xef!q\xf5\xb4\xe9\xea\xb1\xdc\xe8\x11\xaa\xf9_\x80\xbe\a\xd8\xa4C\xcc\xa5\x9a\x13$v\xd5\xce\xcc\x8e\x96\xa6\xa1\xd78.n\x96\f\xd4\xe7D\r\xd4\xff\xd5\x87\x98\b\x82\x8e\xfeh\xaf\x9c\xa8\x1cF0\xa2\xff\xfa\x80\xd3\v\xb7<;\x95F(\xb4u\xa9Sq\xc0\xe9d%\xe0^K\xfe\x8b\xdfqB\xa9\x1d9\"h\x95?\x92^\xb4\xc2\xab\xf6\xb5\xb4\xcf\x9e\xeb\x88\xa1\xa7\xb420\x8c\xb9\x9f\xa88\xdb\xc7\x86Gw\xfd\x0e\xa35q\x8c\x1c\x84\xb9\x1ew\xb0\x98Q \rc\xa5\nf\xa97\xfb\xcc\\\xc2\xa3^\xcd7\xdcda\xf3LF\xd4\xa8\x7f\x00\xbf\x95\xd3\xe0)\x8d_\xdd\x9a \xba\xfc\xe4L\x02v\xd1\xab\x1c.So\x88I#\xe7'}, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1e, 0x2) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 569.990679][ T6011] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 570.009037][ T25] audit: type=1400 audit(2000000163.029:592): avc: denied { map } for pid=5899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 570.028315][ T6011] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f%\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x418403, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r3, r4}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000006a80)={0x0, @xdp={0x2c, 0x8, r3, 0x2f}, @ethernet={0x306}, @l2={0x1f, 0x4, {0x4, 0xeb, 0x81, 0xb5, 0x80, 0x5}, 0x0, 0x8}, 0x2, 0x0, 0x0, 0x0, 0x4, &(0x7f0000006a40)='caif0\x00', 0xe, 0x4, 0x5}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000006b00)={r6, 0x1, 0x3, @random="a703050000c6"}, 0x10) 03:36:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f00000001c0)={0x0, 0x1, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r5, &(0x7f0000000040), 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000380)) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r6, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(0xffffffffffffffff, 0x7, 0x2, 0x4) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r8, &(0x7f0000000040), 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYBLOB="09001320dd6bc98a519c350f008e2500084e67bb9743bf3100000001000000000c00000031adeea2710b8a47484ee73363f6b176a1f1b6b33eb4c757f5c6580909df431a94fff2c88e18642200000000000000000000000000fc7370357b86e979b0001cb2539328c762b5292f4f7f534762a96bab5717111bf16795077477fbdbeb8b750c2a5799c163095f48afd8d04584c1c78720c50eb7fec26d2188a2dc6a732dbe7846862f915f6b18ac8fc3e3f7bd8b5809c2e5a143060e701f2a24ac742fea54ffd19460ce7a05b79a1d2a115d2235157cfaaf256e9c44701810d68f2dd23c3da9000100000000000000"]) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ub\xc9_ctRl\x00', 0x80, 0x0) ioctl$SG_SET_DEBUG(r10, 0x227e, &(0x7f0000000340)=0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet6_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000480)=@gcm_128={{0x303}, "2959fcb3d457133c", "90b566fdd8070000000000cc00", "47e78957", "8500aa66504fde1e"}, 0xe3afca0d) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)={0x7f, 0x10000}, 0xc) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r11 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r11, &(0x7f0000000040), 0x10) sendmmsg(r11, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r11, 0x8982, &(0x7f0000000580)={0x2, 'ip6_vti0\x00', {0x10000}, 0x101}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {0x0, 0x0, 0x20}, 0x1, 0x2}, 0xe) 03:36:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150005008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000040)={0xb, {0x2, 0x1, 0xa4e1, 0x9a2}, {0x0, 0x4, 0x200, 0x8}, {0x101, 0x5}}) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendmmsg(r0, &(0x7f0000002f00)=[{{&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x40, 0x4}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)="a84162befae6b5b8ec62e3958c947d964a7113798262a0dc24b25ea14858e18cbb4b6a403e44f2ba9ab3985ca9254c93a8cf2d45dc3c16d5ad4ca3d589650dd15b5801b9836ba346c7caf7f4d229697140eea07269ff3711792e3b61ecc2807abf3e2b67a56f7a23f377cbba0800b28d3b4cbda14f518cce3635b3ffaaa4e80d590524bfbc4d744995cd241d960295815ffd165ad8ecf8541cc311e1adf6be556d54ae3e666ccc1fc58aa1d6913295f6d31758de24b46e7d1e524b6958af84a539dfe4e4f6", 0xc5}, {&(0x7f00000001c0)="77ede351b2554457310ab4727a8f45b82e7cca05e437c6a7ed9b843b8376364670c17c147b858f1998a4fd08f17507a02a0dbef5f94d301256b205723dc8f67e61171ef44a17ffec66a1b384969ac3daece99949cc23d73d4f18b8c6cecb65c8044b5e6f153b8b8f0680ab38ee250ec781b56a878ee0c3c70f26fa66a1a7bfde93c9df84d45be6dfba39582de09cce801b010d22a7498fb2755843f067fca2943458a44c2f95016c00b3f7a49a4c8b8777aeb91dd81d475fc11de29d33590de1", 0xc0}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="ff4ab3d179b04c6c1385dc822593a85d7a8e0c51811067efcfc5766107d95b7ce13678686bae70c9e0938fc3805a31a89088933ec14dcb15bdc3331da526853be374b99430f8a9034d7fe55e323c038baa665399aaade457cf8cf9f0b2e793250cc7631a9beabf7a3582ae03875a4d78dfb1ba4cb77a0ab262451021913125df21afbd6a1ecee791ab58b240488e4b857be61c16e0dfa35a18436079f0", 0x9d}], 0x4}}, {{&(0x7f00000003c0)=@vsock={0x28, 0x0, 0x7fffd8ef, @host}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)="a13d2ea580a06eefee5cbcde52b85e65e813038c7e61ec6c84724435832960d1208f201df753139555bbe3fe969ab724dfda2388d2c55207d8c74793f9eca41121bcb76bf435e98c07263a0f0a624225b0f02fef63bfd9492fbb2e6c581d8ceb6e5ba2b58afc1bf0b3da50d377f8bd12ceba7dadc3eb0f9e0049f3b1c3f49cdbf7a074a3d0101eeaecd30b5b7d885ae3", 0x90}, {&(0x7f0000000500)="51df119e58e3f3f8e71c50ca6e483c7add53ec461d4ce34c097cc93f980c0a6469f4829adcabec500ad25fde527a7a1c115802578b9afa0d50da188ce26fb2c8132adb2f783080985c8aeae1a9855b8fa14f155b275222469592fae490ddacf0d0895b6fe91247c02b7fd431509f0d4c73490fb142b32905f543687770a939e22cad7115769019697bd34c068e773fc509ffbc29e2ebe58a622acd4060bd8731d4a18dedd77042a47c4862bd8f622ff3dc4fa090b8d0dd12a5030f272fa0283d62a4e35bf85488dca497994206ecbf172955056699", 0xd5}, {&(0x7f0000000600)="0df02d7872cb2994fae26b99ea70cfdc5df61e414dc44412c09d2ae8b23335a198fdf2899d47f7546c486b5daa716481c47856a5a243f7e9b8ef126bac39ac778c0dfaedc9b8fb0df38ea05959a32866729d2426b927195be67a5b7169a1214d57e42ddcbf89f3e287c0c8cb371f29bd8daa0bc01d6b03f08a60f6f0ec3b649d3d821025", 0x84}, {&(0x7f00000006c0)="efc09af818a9a7378178d295858ef730459b7e6db23e760b38721312fa3d180328e85d098ae6c5612d8c5091e05621648599a6b82477bca13afbadf82c28", 0x3e}, {&(0x7f0000000700)="e4d7e64ed53b9d26d2f07653bb46d99d12b345e8061ad1bc9576d25bdd40503d7f175b0e49fc4a0cff97e49fc86dcfcdbe0212d24a5411662e5df5fe2b19f04c968a4271ea0b6cf8073651fe9802eb468c4ef600efa554cd73f7ae422127e8cce586f032c0797ac99b84a203aa5afe6349a231f864d0ab748c26bb7b569372e64c77c95c9a686819cfa999e65c255bb098efa9900d34f3fcdd6a5a36f473a4c71fd189fa72b395d310", 0xa9}, {&(0x7f00000007c0)="d360fe96b298deb3", 0x8}], 0x6}}, {{&(0x7f0000000880)=@ipx={0x4, 0x5, 0x14, "344bba8e4c7e", 0x5}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000000900)="8df341fd42112e92985b9a391e18495e2bc6160ad2f16474b7351581ebb49524e0d2b107a4dc735009ea77b074d53155f854fdc5e58ea2b183cdd5f9f9330ea0f88133b8cdd406306837aa276d222ffa4ddafc3b69a823fbeb8dc3878ec89ec172013f4f67", 0x65}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="4ec7350d07eb303a8841ccd752e4b0563ea08c0ad898d5616bbb26c55465d9c2213ecf68502dca4c82563fe02a6a52cef4f3b81dc676f1d789ccced5cb3000b9ba6dc1f964f8d549b17081ae372e78da83be62584b136e695e6cdd8468699803bdcb51c5c55ceb83289593f828ba4bd4a8eb755578a1125c447bb03089f52401c18543d6373011dadb93ae6b1dc320c06d5c5f2af07b0ae12ae8045c7886944b8faa40b3dca335517679ffc544d1a08bd474ffc94035f0e010f2c20786329220d81a643ed4522c450cf22d24ee08741f3ea97acb7481d7ac0a9e36d3b2b4483c2941", 0xe2}, {&(0x7f0000001a80)="911942f7bd1ef1dc5cb53081f55016ed5e35b81ba0cc6fc5f0355820766043114d624f687f7ce0b4bb990e5e038fced01ddda6ebe36e684479ca0741597c94e533bf913a50bf534079ae6935562897c70cf13e33de35f72b86f11f86", 0x5c}, {&(0x7f0000001b00)="ac81231f6c1ae3e4ec59b4783e094c40177b32ebd8d612462a433eddf9690d26f222e993239d3fc115f5406c4d6f915ea88697331cfbde2714862707f42c1fe26134c5390c972fad4c399d46b4012e105f1961b1e32f8b8342a6b3f3f14d159f0e7583506e2e2c93a46385dc8e67a5caafaf306e4fb6d9b04cae814253cbe007376a7956a5aaf7e10bdb5817498ab838db48757c5a", 0x95}, {&(0x7f0000001bc0)="f781ddccc0161e3654e0b86cc4cb60cb51d10b8d1257590598f02d349d706fc47718005947f6adcb0e8c806162155c34d4b027b46c55d28ccc9cb6b22c8ab838eda05517fe0e3a771758fbead96f3fd0592d7f2fca4828a533e951d63a8d908db49514fcc1cb3dd5ca72a3341074a72cdea4098317e5226e75540a7477a4208de36a3c033f7317532c47b6ba2da5ae642bda997c7e8674e5bfc783544f49639327efb862aa1cd7e18c73d21a895bdb089266541cfaad49e659520b4e05db6dfade4cf257b476fb92083562132265ddc3b1ba8036b153a661b37cdfe1bd4bb294fd3d", 0xe2}, {&(0x7f0000001cc0)="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", 0x1000}], 0x7, &(0x7f0000002d40)=[{0xb0, 0x223, 0x2e, "da564e5d96bfe3422abdb02a06807d48137c84c98c5273d64587f6a03c2aeb98254905072cc0194aeeca65d472f3cc59e175f5283f70fde56a0f379aa3fffd96340ceb984047f825572855dc4df63c5d52b65a9de48e3c366e78e525090ff54f4585c76c322cb8dfb178c98d8b37dcf7c9028d655e6cbb3a3bce9c7e98b8b56d43fadcc99189cca7f79461784fd7a4e8cb34e32a68acdb83318f80"}, {0x80, 0x195, 0x1, "ac55c37bea65e9e589ac43572c29a4a9bb2e56084dbdb7a6abc1a87f4e9b3876654d8881f07270abc51cc8c6c68400c8ddb4ec9f0dfed1c157090dba8e43594764965eab5b0e96c79c775f0d014fcc1eb567d8734a6428f57e465804696cd358c5c12585e07c8378725dca016818"}, {0x88, 0x84, 0x4, "e306a74d06949cfaef5e38406a5268bf2ec0cf4042394231bcb0bc46fd4231f93f4c02889e0635a9f695bbc8c4758a093fb39231b0fe69e3aedad978a29f7532183cce41ac9a404ffb9968642f708337d36e306d64792567f7ac19f8d4662f73ad265d27dfb259af3f91aadd213d9284d02408"}], 0x1b8}}], 0x3, 0x76764b4bff87914) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 570.443838][ T6041] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150006008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:03 executing program 4: syz_extract_tcp_res(&(0x7f0000000040), 0x5, 0x1) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f*\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 570.727272][ T6136] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r3, &(0x7f0000000040)={0x1f, {0x0, 0x7, 0x8, 0x3f, 0x9, 0xff}}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r6, r5, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150007008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 570.943544][ T6114] ISOFS: Unable to identify CD-ROM format. 03:36:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x44, r2, 0x310, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfb8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x11}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r2, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xd59}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x185}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x200000c0) r3 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) setsockopt$llc_int(r3, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 571.047201][ T6177] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150012008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:04 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:04 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 571.121607][ T25] audit: type=1400 audit(2000000164.369:593): avc: denied { map } for pid=6180 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 571.219316][ T25] audit: type=1400 audit(2000000164.389:594): avc: denied { create } for pid=6179 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), 0x4) connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote={[], 0x2}}, 0x12) r1 = syz_open_dev$usbfs(&(0x7f0000001300)='/dev/bus/usb/00#/00#\x00', 0xe4ff, 0x8000) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000001340)) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000000)="fd", 0x1) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r2) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001100)={r3, 0xb5, 0xd0}, 0x0, &(0x7f0000001140)="5d95584390675bb405d0a127a55eeaf0f3e5b8904d54dff76f300c0caca9b1155cf2d231553d9b09beadf4d38777bb24716e9f847350a2f5f1e3e894269376eb1aa8220aaa8cdc2f44757dc6056c460898ce6ca0d21c9faa446c038a76ec27b0b832d319663e5abc7ecce3d58ba327b09154bc24a4da10ef4abf3793f5d8befa58e87532b9ae7705e55f4a727aa5e31c0ced32329ba78381b010b53e2b848c6ef0972c100fc57663116a6d6ee61de98796f506b079", &(0x7f0000001200)="fd7fddbcf8715db768232c7a34bca03aefd1eb119f68c425f3cd5e7ab103467c28c80dd426c24071ecc40cc404cc394943f292517d3e3c3ea6a37fd3e4479794a79cffd89397f234ada21f9a077cd42f6c40254c180e618e37fedeaf685e77eaed8e88e003f94d23fbb4da5f11262a099a3c32504ce9c5b3404cad5a4b88f090706345adeee287783414fd46050d33f6b3f9842bf306169c9c01894a80adc37083303acf4e736fb2cd0e8f08d5f0525d9cfe5703c87e3a3bfbfcc4d39d17b8a853467f1e6b76d81773b4887dfd000638") 03:36:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150014008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 571.251307][ T25] audit: type=1400 audit(2000000164.389:595): avc: denied { write } for pid=6179 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f+\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:04 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x2000) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000040), 0x4) [ 571.383958][ T6273] encrypted_key: insufficient parameters specified [ 571.394164][ T6273] encrypted_key: insufficient parameters specified 03:36:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015003a008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:04 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x120041, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3, 0x0, 0x6, 0x0, 0x2}}) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 571.582628][ T25] audit: type=1400 audit(2000000164.389:596): avc: denied { read } for pid=6179 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r10}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000380)={0x4, 0x8, 0x102, 0x800, 0xfffffffb, 0x2c9d, 0xa000, 0x8, r10}, &(0x7f00000003c0)=0x20) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000400)={r11, 0x61c}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_RD_TIME(r12, 0x80247009, &(0x7f0000000340)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:04 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 571.626190][ T25] audit: type=1400 audit(2000000164.549:597): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000040)=0x4) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:05 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x3, 0x1e, 0x23, &(0x7f0000000040)}) 03:36:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x200, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x7}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x30}, 0x4000001) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150068008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 571.930542][ T25] audit: type=1400 audit(2000000165.169:598): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150069008178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 572.101452][ T25] audit: type=1400 audit(2000000165.249:599): avc: denied { map } for pid=6361 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f-\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:05 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) iopl(0x90) 03:36:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/ip6_flowlabel\x00\xb9o1RF\xb3\xf5\xdc%bO\xf0\xdcS\xcb\x03D\xd1\xe9\x88Y\xe2\x1d\xae\xc2\xca\xc9\x010x0) r8 = syz_open_dev$usbmon(0x0, 0x0, 0x0) io_submit(r7, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r8, 0x0}]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) io_cancel(r7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x1, r5, &(0x7f0000000500)="299b0130683a9764aa119e149ad5bcf581c7b2f779926a4de87d1132aa9707c3043b06bd52356d3262be026c789d4608b88014b566a37316cc1d1a8a9df5f779504eba59119eb34a43104c1a16f090eafde7dd1727248a8ffccc3a429e95433d6f7ab4b64be08ee9b3436a5a5fea3f31f3c2ceedb8691130ffc0e6b18b1ca70c34408e6b766ba696e3f0b7619e2df81e5923f638eae16b5e23497833095e8726dad8746e24249ea9cc5fa7883efa833ffde216c9efe7e21d8d638405f1cd6184db2d4b7b6099b6760221fcf497f28d5c67bd7afd84d44e6249e00a9b3fb45dbf0688d5a5dd4bf75174a33568e5d19f7744f9c33d493cfca699eddab1f8ea371c4bc166de089fff8aa534332f9e66bc9e9d84570b20613d97dd35e98d9ac546408980a353fce9199f79a5130f28caeb45102e4093db19c7170387f651542ad52f682a1d3b6ed814e309cf19fd8d217f9d3e37b37e7cb168bd664c69eca571cbc109a39bf638a518719a9f5ac4683e31bb440d8591a6e45504a657f2509121696b17a8cbd6bb0f3474c98a1286b4d921c0a475bcb9e83b241417c26662531f7c74731affaae871dabbf4f49454c8bb6dc568df5fc4673e1e6c8262f4c99c7f2dafa18325d44ee57f20c25f89094f1b9ef352d672039f42dd8338bcbab7d59970a46c4e622b62f9207033e72fb251784f998c081e005cb3d12af6490858381f21db22d1c682ef0c3aa4a94f1f6de0029bd8c794512ecfc592f6992779195cce6817ad3e78a2a485d8b2005e51dcfd7b64d8bd91846b1c4e2d840d47174c1ae37df5195f1ed86614631b0d067382be9ced552e10a85e6774c395b20062f40d8cb4a83940671bb8131512ce046104c262664d89bc9b1588a2f300eeabd2055c6f0135f64acad7c61316b8c2a9c36beed82921eb2c5e32792e260092e314b07bab53710f5ecfcd589b85682463dc7d52e30a7a5c503227ce7300d7882e3733ea0cf8dd401c96aaa4f527d1b0edbc54b4dcb121727070dd3d5f167ee0a8111526f627d333e041e96e45d9c074ef1d58e5ceb7cac862874d0dcd5743baac1b3910d99f2a7101764325fa5d9d8a9ed24752bb5e1fbe389ab569d22ac8072e54103b418677061310b2c8853c9517961c110ce92ad0d4283bfd76f3e822930bfa91915a3a6a61933762b713a0a22843b0fd1dba5ac2efdc9c671563bafd09e7b76c6cf5b9381794efb1fe66ff68cae530005aca2a522d904b877cf5abf348b892fbca08a2f0cd2d1098fea1416da502bafbd047b5126436dda5f18d2b193fb9fb1896c308924b0967cc0a8e112fcfabe0a2d2fb4892a8c2dc4b7fc059ecb58e5081ee1ea4141df7476acde7e59a77e2f3a0711bc73ceac5ad3d8ef9f9ce28a33e4e761e48c8c93e462bed71d3df09f32fc5ee47b7cc48ef9a2a24935af182da52707862422be5c80d70bee8884c384e00e3f47e9e0709d0c5dd814366e0007f676ec7806b00a2e30ce99ae9f2ec289038a42cd934d94e7816aff5a5097452d14df1aa7c8e971e37549df697631b0ac2bd4c09e1f4c77380939315883e96eb319ce81c3e957c93b55e8c734f07644c2854976e08ce80cd69c3be77905d989044ff8ccfc3e1d890a632f00d55a8ab5299958f772ee15f8152992ce62b264fb4bd4ed5de4d3dce71820f44ba54a83820b33bb9b5831936a3f467ce40cd24c43031a0ed2e86a381d210dd945f94d328f0169212e3546b2ed0b80dd00dc0e7d44649e750107351be87b59d7451a5b2bc77ec0e2c26a03f34f42770c05a137265c21da4aa7042b8c62a18bdf2c5aafb7f545f57a45382dc9e7c17efdce3bebf107a7082ebefed5bde24a07b6ad3a81416cdbdd41c4a78a1dd7012c04948b067d39539a55e9b54ac68b9906284f5cf657d63702a33bf624756faa584626a4edb1ec725fbce25a80b65c8e9c3b88e7226c934bd78eea47b5e53b42d6ac85e9d180e93a1398fd9f580d493dd1b8b44b326742eac550b76fa93b601cca3a9e3f6783bb64c2a26eab19942f3b8b4504086ce4e9365ba6b8f380f2cab0ee924a77451b11fd720a8af6ebb30cb92a665354036eea96132fbb759d8d1121e985a8a0a881be082125c1a8644385be1510b724f2d8dd60044b798c585b5f5655a8e017cbff1757204a4f02f328b3d5cf47a4e6c434211a2c076a6b8d4618806633cb21e96b10da4e145c3f896f996c382bcc4c95937f36e10f306b72a46a4d2dd0a64cd763cba0b0b4a3a93406b1cb73eaeba1b8f71c6c4fe94a55220f55853ba861750c0e857b6e1a295018d2c1e0816424af39a146dc809f04cc3b015368ec745fbf45326489c2c3f6f0f7b0036c01605b1508a419fcb4665690dcece4daa8d11304d2778467c9dff880491b2ed566a9a41461282fe74993407de790cc2864ccad97f1db97f2f4ed7aa24b4a2e1099a5d74aed99eda746f8eb17def88998e511df692d8c632a8ed02be99326977450ea6b032b6dab47612898bfbe5c68bf50e3736989ee24b25d52205d594f73804a914e3aab4dfa5b12cb9270a65d580a52a344872307373b190effd4a3aa772669bc3d1854686c7a0b6c49a2e2767b2a3948f7dab9d9f80dabe20675875b2fb41462eaf168aee28c83832ea7ac735928c7798c12d81528f6b6f6ed75e184a0e15457f3113cf1447af5a342571a009440ee4f9010a041585efb3f9dea8a2d4b5b1f89bed0f0b20e31db976b710edec13f7095fb619231f7a452ae1ba1676885eaf2e82e096ca8be870af5d61cf5b8c5871b9d5e81d65d9a8fa42bedc124442f6863fda3dff485177f81ef252097769d04cd2f8fa8cbd6c401304488431528266b51a95d01c07077388b364fc514f33351beff19c286e6d27df9cfd3b243ed97e40464fbe05e732480591655b14013f0521285189355bd4b7c55adb28e33b3068260a60747f61d9d4a6ac4748d51b4dc50ac026ce59a12709dafdd14bdf67834804ae06deab3974a0c49257e6ed0d6a1856cf47ab6f07ff612d6d28611d0605918607c605046f93f44fe21527abc0a1517152f89ec7c4ddb928f51e2dbb6b37cdc6caa8c35b41f78395e3bab009ee47a793bc5c69644cc52cef67f409f87b09a352a5c47b468aeae379dad034da0ccedb183645d2a07f2241c912455feffc7a946eb403c98331d2a2b2ea8e828d287bd0becb3bcf902691eea3388d01cd0aae29e751834984cd5d3886786d5552009f2cf3c64be3f8954d8411873c698e033d8a9fb53038aeab6ce1c013a4dcb5310060ca0b1fcedbbe676196dc3b890fb6e349a07e9c0062d3354826540b59176cd5beb94401f34d469482c2a86be07b3e9392d4b170598434559d1c6489cc31a5f278573be59e7d8d859976e7972c7be4466ec16bb3f15f4eadb18de79533c6f386aabcbb50393578e344853edf5f62533207ec35247ee54e8c7e70ed8f4c55231edb6156475460fac2d242b64a1226bbea88edc16b73f352758e6422526ed12e0e961beb66f1fc98195653e8b12e4c251ae421986859a2b5c7d19cfe37b7fff841887868b60ecd98b7c156abc9372561dd2cc959b94bdbb10aaea81aef9deeb91da53346089d6da448a362683384ccda5e4f5b76a7e1ae837ebd336ee90bc51a5caf43749e4e9d885466237fefb720f727879fa5481f172d355f7f882e450179872f1b997928bdcf14494d6ed83cab9ad28ad94f141dfb54b91c3626a5bc30ae74af81c64d99c7f15b343a199fae0a0a2432bea6faea86afd68a2adb42ac2ebbea679612f5e84d3306720b690f786ef75badb51d30cf9a0f4d89f1cc87b57bb0183dc812037e1f0d58667c42386eb3d86b228a6734f38ed49b8765999c372090d34158356ddb7bf3b3a3fc8d837074d6bf959de1f06b608f8d6938680f5deeed768c371a37301d806fefc7ba2cf32237c60753212b1150c51c4ca4115cd3266c0871e826c31e97a1ddfa169c23e819f75d704af8c14e275888c17d329c0d909ab67786a1494760d1c547d079ced8083faeca63473d21806f2b0651b2027cdf9cc7e653da74d945a81cd9980c8afc4fb0a26e819fe2fef61b079bc2bac42b3c4bc6c65124320db348d9cba4729033c06d391364b2fefc4434d21c48dff554df0b6aef3dde74d5a9ed116c676665526311048ae6331358bc837c2cc616c226e543b615f1b6117e162f910f325cad02f40f42edee386b87b275ab74ca050f6913a651c25e6f06b181136e116efdc6181c66fe95ac0c27cc2a28a4418a91c04a63fa807c51ee1b25e443d412a718c872b021f563c15b991c7ea9fedfdd560782164112285e9b768c0b13985f02ef24828f10f5f6335499b6710d2f421c680af416278d785bb1e9bee741aedba92f61e933aa7ed810eefaebfc27a362460830ced149c8273219560bba373181b21be927debdc8913f0c264f8b5057c4f387aa78b66c55d6b48a3c50a23ebe6903f53f90069b9b223cf806e09131060c3a8d7e554d1c1d7c8803009c84999bf69b3796164c0793099486fd8b03df4d90f596ab67ccea4120235f5cd027d0ccc99a9f536ec0b8ce8f6406d40cd3cf4bc736d719deb168bec4b33cd233790daae58d6ab3197438d81068585a8c61579e98edb1a9f4d307ce95a8a2f47500309ab0aa9a0a2f42bfa7359982beb63431cdc6df2fcd4422c95ebd76c4d9b929d7107a2116c5ba5b82639c8f928e0461a79afef99f27451362514e2ba03014aa24b02bcfa0d97fcbd6bd2b5a4b1d4a4e75aae744b98c50d7aa37b6f3471e186b6b176a1c73fc530598511b485d2ba6d1d683d6920eee0f94e72eb1b7032abdf0684a6d601670c47014dda0ce76d864a82b003c9ca003cf2bbc1322c3854067b15679d78608668695fbe781c3c625800cb09feda89db476b213ede6e4086043341fb8e59d7f93fa176e59c2bf065e52ec2e6b8e845fca90ba877e20b397138755ac9bef3ac70ad94cea7c2277b23817674c2af2c582be9325de2716eedd2d047a72c306ff52040d06d892b5c8bbfab0f87d5c61c66dc0ef73f8d599ecab00d4e5c641ff228d31c15365b74df6e24c8b2ed44bda7f3180d960ac45c20c96440f18cfb809fbbfb744ab12f8fe5b536c5a3c4e663abd90eb3c794b520e197571018e228752ff0d2c3d71cc0df8118c639dc16a4bf5c023f5129417c0afb6bee936ba693686c5b6917d1f8ade610651b99bcb20aa67d66b0b87ecfe8c3851b834c0a55706a96bfd89367aaa952310bd713d8f55b8c0e0b6d637d05d22199b19d1dfb73d31510891c593337ba52df20a58eb938be3ab6d48f74a676c450d4cfc560191ab986f83c3f0d02c56a9bb19b977a4b95cb9d57db81c57f669660426774ebdb00342c52a5b980a9ab8e7bb9deb6831e3c803b89caabad0f747f8b614248c2281c546f7001adc81a74187399fc0b7d3a4308e77d63c6be22a11296a89c915c599d9bad944334af41139bdad1a6723a566b668a6bba5b48b4b7aa7a1a14fc86d8ad7ff10d5c7c02dfc2181ec90d72ba6325be96781cd514e07d08a84bceb458d74d1e46d0c85de5094f8b4504245c34ade54682f26edfba4e071d90902366563c07b4c7a08afead65da929e6846f028235503e4b63f84e61e0b160896a2fd5dda9a6bfd533dc0adbd022796b77c6c0a2b63b13c460f7a0597b622c5d301dc84954def944c2de0c685e440d14832560ff2c91e7341087931b8d3f786d40592029fb32333fdde33fb253ddea2aca4bf85a6d4ff0eb63dfd14b1e889fccc4fd2f9d509cada13730a5d13f500a", 0x1000, 0x10000, 0x0, 0x0, r10}, &(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f0000000400)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) fsetxattr$trusted_overlay_opaque(r6, &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) [ 572.282606][ T25] audit: type=1400 audit(2000000165.369:600): avc: denied { create } for pid=6363 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:05 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4080, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r1, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff4d31}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffeff}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x10084}, 0x20049014) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r3, &(0x7f0000000040), 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$sock_int(r3, 0x1, 0xa, &(0x7f0000000240)=0xfffffffe, 0x4) setsockopt$llc_int(r2, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004018178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:05 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = semget$private(0x0, 0x4, 0x200) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/244) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 03:36:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002088178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:05 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000040)=""/24) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f.\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:06 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40c3, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x4, 0x3, 0x3ff, 0x2, 0x5, 0x1, 0xdb2, 0xf54, 0x9, 0xfffffe9a, 0x8, 0x5, 0x2, 0x1, 0x8, 0x2, 0x0, 0x7fffffff, 0x7, 0x10000, 0xa62, 0x6, 0x80, 0x2, 0x9, 0x8, 0x800, 0x0, 0x3ff, 0xfff, 0x400, 0x401]}) 03:36:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002098178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:06 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="fd", 0x1) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={r1, 0x83, 0x50}, &(0x7f0000000080)={'enc=', 'pkcs1', ' hash=', {'xcbc(anubis)\x00'}}, &(0x7f0000000100)="ffd9701a17ef6b0bcc970b251ac3542d87a2ce61c6800a1ecc12d19e6cc9da0d5f9424adcfbc8303a1d27f9bbe2023b38dfdc203a7e6411b4fd03efaf082aabab4ded7537782bc97cd483622d4c4bfc3a636a465926b4c37a09a6bb74f119ca8dfcf3d13605923f04792337c3b0717dd40965b912f31bebd2c840eac5bd6e3ddfb5882", &(0x7f00000001c0)=""/80) 03:36:06 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x206020, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x205, 0x1, 0x0, 0x10001, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r4, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@rand_addr=0x80000000, @broadcast}, 0xc) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000200)={0x64, 0x401, 0x8002, 0x4, 0x10001, 0x5, 0xac, 0xffff49da, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000280)={r9, @in={{0x2, 0x4e20, @empty}}, [0x0, 0x1, 0x2f59, 0x1000, 0x8, 0x3, 0x4, 0x1, 0xe, 0x6, 0x78d, 0x7f, 0x3, 0x8, 0xfff]}, &(0x7f0000000380)=0x100) 03:36:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002408178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 573.386110][ T6535] encrypted_key: insufficient parameters specified [ 573.420411][ T6539] encrypted_key: master key parameter '#³ý§æAOÐ>úð‚ªºencrypted' is invalid 03:36:06 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f00000000c0)) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000080)) 03:36:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f/\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150003408178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffbffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:07 executing program 4: socket$unix(0x1, 0x3de3c65483d06524, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150000688178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:07 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0xda1668ea0f8c8662, 0x0) r1 = socket$inet(0x2, 0x8, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) sendmmsg(r4, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="2b9aa1fb237964bf4ff75d11c8933001757fca83d08b78d10000000098f2ce4a3a550da62998657dbd18f44b244db3cebd3a7c260c020bb7d978e1ea96c895b7d01f831457679eabaa70df417e8fb5fea4d1728a27cc8d7db394931142a90c62df26be287333233ebc368b48e71b230112f4a2bad610ed9421460749f481ac831a93861e638fe7ecb3ae6a63b401c4c2621125a4d6ac89080a9e06beb1e88be8d24cdafb8bda0d77468af44bd6a35c4299350b", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYBLOB="0b3d94efab3d305bacb4324fb642a80c", @ANYRESOCT, @ANYBLOB="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"]], &(0x7f000095dffc)=0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000240)={0xfffffff7}) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={r9, @in={{0x2, 0x4e22, @rand_addr=0x4}}, 0x9, 0x5}, 0x90) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:07 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffffbff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150000698178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:07 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0xf2, "94604002156138a276012bdfc40295da3b1b3d804b76149a4e3b8b2d6270ad8cbb80df47cfb1ac5a8cc2c794f0abb32e26e98b6bab91c5b7212231bd84049c574e044179e87558028f21b1a10414ae170b682c2513b80969a3c6c60d2258c362923a904586c3189b13b7d88d66406a71c247d7a66866553a87305023cd4a3aede5a75bf909714325bace11b130e68a5d08abfb90dd9710d93645577f43972f92551a7bb92a15f25576495e28e647bdf60314a01675ed3c5ea4b084b12f68ebfc31428bc4f7e842762120a3aa863572ad3d7eafccd2ebf4d953bb2384af59fc592a5a6b24739ac66ae2cd433ecfe6281c736a"}, &(0x7f0000000140)=0xfa) 03:36:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002808178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:07 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fX\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:07 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x6, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2a0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000200)="2003ff95f9b3ac90b5f83e40dcdee185ad945e8d049eb7a02fc2cf5a018c839b9388668c227f21ef6c0201d9fc671fb86aefaf04451672d7"}, 0x40) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000040)=""/232, 0xfffffffffffffff9}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150003808178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:08 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000000)=0x7, 0x3) [ 574.807698][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 574.807712][ T25] audit: type=1400 audit(2000000168.049:603): avc: denied { prog_load } for pid=6623 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:36:08 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150001ae8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 575.154725][ T25] audit: type=1400 audit(2000000168.399:604): avc: denied { prog_run } for pid=6623 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:36:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150001af8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000080)) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x80201, 0x0) 03:36:08 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2f\\\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:08 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150001c08178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002c08178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:08 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x2, 0x45ab18ee68e110fd) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) 03:36:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150003c08178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fc\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000000c0)=0x80) getsockopt$llc_int(r1, 0x10c, 0x9, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) bind$bt_sco(r1, &(0x7f00000001c0)={0x1f, {0x80, 0x1f, 0x20, 0x9, 0x0, 0x1}}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r5, r4}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x1f3000, 0x10001, "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", 0x4, 0x0, 0x0, 0xfd, 0x81, 0x1, 0x4, 0x1}, r5}}, 0x120) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x100, 0x129800) 03:36:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004028178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x1}, 0x10, 0x800) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:36:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004038178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fd\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) 03:36:09 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000000c0)={r7, 0x0, 0x16743448baf34afa, 0xbb, 0x10000}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r8, 0x9180, 0x3}, &(0x7f0000000180)=0xc) 03:36:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004048178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)={0x24, 0x34, 0x10, 0x19, 0x9, 0xa, 0x26, 0x108, 0xffffffffffffffff}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000080), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xfd2d) r5 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r4, r5}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000000)={@mcast2, @mcast2, @dev={0xfe, 0x80, [], 0x22}, 0xf826, 0x8, 0x1ff, 0x300, 0x800000, 0x200000, r4}) 03:36:10 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fi\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004058178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:10 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000100)='net/xfrm_stat\x00') r2 = syz_open_procfs(r1, &(0x7f0000000080)='attr/prev\x00') r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r3, &(0x7f0000000040), 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000240)=0x14) recvfrom(r3, &(0x7f0000000140)=""/252, 0xfc, 0x20, &(0x7f0000000280)=@hci={0x1f, r5}, 0x80) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 03:36:10 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004068178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0xf, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_value, &(0x7f00000002c0)=0x121) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xa9, "3b2dc331d4ab9162062bfdeed0c9ac63fd7cc672fbc027fa1a6f351c19ec666004c8a29ba5c92f5fd118e99e1f29b745b1d5c808f7efc24a7bbe6519b3a4f9e48fe266a6da535bb6fb56a0fe81a0d96715d4fb9cc77ae8c5ff8ed4fa5c7f416e76798ff4f431c18765ed7daf2b11676da625391a038cfeda692c98c8507ad31644956b91cc8c850df6b34ddbf6841dd8dcbe840ffec98b3a393f6a54078a2119ca1aba4b3b3aafffce"}, &(0x7f0000000140)=0xb1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={r4, 0x1}, &(0x7f00000001c0)=0x8) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x400, 0x0) ioctl$RTC_EPOCH_SET(r5, 0x4008700e, 0x7) 03:36:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) getsockopt$inet6_dccp_int(r1, 0x21, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:36:10 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:10 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fl\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004078178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:10 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, 0xfffffffffffffffe) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:11 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fo\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004088178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:11 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$alg(r2, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000080)="129c1ba971a83131382b0c3bc220956b45115c2b6669845b5f498abfb23d3d66c3e6c39671341ed720e7ab05b15cd9ea27343f506c588a76ea315601578f26c4379dd884b1e6bb2cb0cb7e46ffa1e686e296ebd1b084bcbfe451023ccf60e3e92734", 0x62}, {&(0x7f0000000100)="0cb63a402ec3ebed98781743bbb7b7ee0fdd0861fe3d7009f0da4507f37c8f4da24e426b76d3c12335ee7e09797b6ee9b5febb5b16881a", 0x37}, {&(0x7f0000000140)="bb913d2ae9dcdbfd6c0ac17f48c4b4a0a0775d5c7a0171af668f83316e4847c22a4213d234df9404402532a806f507f2a258a8baa3b3323160b4a7d03d7c71fb1a49df2868177e523347dca1937783a90f66f9e9c7f54a8f328d435ab0070cd53b93e0c4f6075df4930fc37f5391f803a18aa02081092e89503969619567a902fb9f01160ae43021017d27297813c4ae2905f89a23248d90847cef4a16a4360b90ab01e40dce107e009680720a2c826ce172fbdd34f30ba43092506e411d5b37122000321c74f10321e64d9f", 0xcc}, {&(0x7f0000000240)="1651b0e8b4d119f74f1e5c749b1deef9f7958e142143f24fd37cf72d000a278e9abd763e10349bba26bf358d43f30acbef241aafea4ce708ce3bfc83ea551d4470ea17fb63a46318c1015ceefa11c56c5cd04e44f3416d9c2d818d05aba0a823ddb41252bb272d92aad2224c5998733feb0f80b7ada80c225cfd3dc66d432b00a15423d6d7fb9cbff115d172d2b5cd8c8b5c1d03464e0d9f75486a122a71b59baebc1606ed2e82dc225048571fc1d491d09c1cf4849acfcfa6b3953c619007848d934b922a81872764e2fcfeee43bd05a7d3d31ebf63cd66b8dbeece", 0xdc}, {&(0x7f0000000340)="00b986e29aeb7f7d5f09f9e740ce801aebe57e7d8da44fdd253ddd5b9f8c3162b2c67c237d2c9885f94d636a710c5155fb42da37747e260637cf700507794c79c7e41ec9ce658d9b7cc6beae4e2f57994e53d15b4ec3c21a56e7d68ab4d44394f152d2bb06819ad1a3c7b38dffc0bab6002d981fa5ac9bb01a52012f1fd9e7aa3d839f8b05fce2514ba48e80cb76b5918368e4a88fe209ca7bd51549f50d7ccd61bef589fb26965d0bdeb714c6e0efcaf8bc32", 0xb3}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="5ac3227e4d563f1cf323634f6733cbec572c5531bb2c474236efb5d8675a36432e8809d0d5221c16e9628b1d0aae0b2fc47d454a732de3025d0a0123412709f331c932c6e847b6570cf141ccbff4d6ff604a98a72f54e258f9db218100acb765fec4f825712c8a4e1d3b96bb7a7bc025a27417921021e98bb7864752fddd19c96273c34f21a4ecee5b8d6ee7fd85", 0x8e}, {&(0x7f00000014c0)="d086115467d5168d05fc8ebe48075cdd7802f6d1acfe905113799ffe73cd7d75e41f3c5a660c328cf5e6ff859e20a201f27cc925f648d12394bd85d6ca5cfcf6be9236eebdd43c74e46239ac45435c9505a508e210e3f5571c83a33cd362d7b79a9d2ab9fc732ae70089e5e13005683bb241b4478206d233fa77e25c85c629ae1c4924b1e3dff00ce11ae956b580ab90ac9488bba31975dc05c85538eb70914fb29d51db9c2f0c6d76ee6d1169a2a10d5d3f67ebccc6bb9469329345d321d1b7acbea9b58e764b0d15fdc60a70d739ace2948042226adbb560751ada395cd57b02ead33e719c06de", 0xe8}], 0x8, &(0x7f0000001640)=[@iv={0x80, 0x117, 0x2, 0x68, "c0fef5146075a2841babf70c4a5b37f2bac6a77744384bde0be0a5198340c8c73adfc360f4eceebe0efa60d132abb5db260b542cd792f8bcc0bcea14ed874bf49bcc6d5097e3d522aaf0cb40306faf191d65a209309a677c231dfc25e7cc39b36373c0042901c682"}], 0x80, 0x20002001}, 0x20000000) 03:36:11 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004098178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x40, 0x0) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, {0x78, 0x20, 0x31, 0xea, 0x1, 0x3}}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x97e8, 0x2, 0x0, 0x2, 0x20, 0x55, 0xff, 0x9, 0x0}, &(0x7f00000002c0)=0x20) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000300)={r5, 0x3d, 0x3ff, 0x0, 0x4a, 0xffff, 0x9, 0x7fff, {r8, @in={{0x2, 0x4e23, @empty}}, 0x0, 0x1, 0x3f, 0x8, 0x4}}, &(0x7f00000003c0)=0xb0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000080)=0xf237) 03:36:11 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fp\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040a8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:11 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000040)={0x1f, 0xfffff7e9}) 03:36:11 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:11 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r3 = dup3(r1, r2, 0x80000) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8835, 0x101080) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000080)={0x2, r4}) 03:36:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fu\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:12 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = dup3(r0, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/63, &(0x7f0000000080)=0x3f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000200)={0x8, 0x58000000}) recvfrom$rxrpc(r4, &(0x7f00000000c0)=""/216, 0xd8, 0x1, &(0x7f00000001c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @loopback, 0x2}}, 0x24) 03:36:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040b8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040c8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040e8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fx\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:12 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='timers\x00') setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000100)=0x1, 0x4) socket$bt_rfcomm(0x1f, 0x1, 0x3) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x9, 0x25fa54aa2ff2545e) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) 03:36:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040f8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004108178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x02', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:13 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$rtc(&(0x7f00000001c0)='c#s\x00\xff\x01\x00', 0x8, 0x80) fstat(r1, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x10000, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000240)=0xfffffffffffffffa) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RFLUSH(r4, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) 03:36:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004118178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004128178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:13 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) getpeername$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$llc_int(r1, 0x10c, 0x2, &(0x7f0000000000), 0x4) 03:36:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x03', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004138178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004148178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:14 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004488178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:14 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 03:36:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500044c8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:14 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500045a8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:14 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) prctl$PR_GET_TIMERSLACK(0x1e) 03:36:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004608178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:14 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x05', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:14 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0xe6b19532423ea954, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)=0x8a, 0x4) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x4, 0x8d, [], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=""/141}, &(0x7f0000000200)=0x78) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004688178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:15 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xc00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500046c8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:15 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8400) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{}, {}, {0x20, '$)'}, {}, {0x20, '*'}, {0x20, 'Xvmnet0'}], 0xa, "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"}, 0x101b) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x20) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x10004000}) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000)=0x2, 0xffffffa5) 03:36:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x06', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004748178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:15 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\a', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500047a8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004fc8178a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008278a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\b', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 582.982465][ T7126] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 582.992589][ T7126] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:16 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008278a8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 583.150754][ T7132] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 583.210973][ T7132] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015000400810aa8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\t', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 583.464771][ T7151] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 583.494739][ T7151] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:16 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000080)={0x1a, 0x1f, 0x0, 0x1, 0x0, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000040)={'veth0_to_team\x00', 0xf801}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015000400814ca8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 583.769264][ T7170] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 583.795412][ T7170] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\n', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b80040991000000005001500040081bca8001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) [ 584.107126][ T7186] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 584.155598][ T7186] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800409910000000050015000400817803001600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:17 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x20, 0x4) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\v', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8000500400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:17 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0xd, &(0x7f0000000040)=0x5, 0x4) 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001500400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8021600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:18 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc10c5541, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x400, 0xfffffffe, 0x2}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={r5, 0x40, 0x4, 0x80, 0x6, 0x7}, 0x14) perf_event_open(0x0, r2, 0xe, r1, 0x0) r6 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip_tables_targets\x00') ioctl$MON_IOCG_STATS(r6, 0x80089203, &(0x7f00000000c0)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$usbfs(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x8000000000000000, 0x48000) ioctl$USBDEVFS_CLEAR_HALT(r9, 0x80045515, &(0x7f0000000200)={0x5, 0x1}) ioctl$SNDRV_PCM_IOCTL_UNLINK(r8, 0x4161, 0x0) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000000080)={0x8, 0x80000003, 0x6ba3, 0x3, 0x9}) [ 584.847974][ T25] audit: type=1400 audit(2000000178.089:605): avc: denied { open } for pid=7232 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\f', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:18 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), 0x4) 03:36:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8031600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:18 executing program 4: chmod(&(0x7f0000000040)='./file0\x00', 0x80) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x800, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0x80000, 0x4) 03:36:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8041600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x10', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:18 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) 03:36:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8051600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8061600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8071600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:19 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x4, 0x81000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150006008178a8001600400001c00600000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) getsockname$tipc(r2, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'veth0_to_bridge\x00', 0xffffffff}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r4, &(0x7f0000000040), 0x10) sendmmsg(r4, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000140)={'gretap0\x00', {0x2, 0x4e22, @local}}) 03:36:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x14', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 585.794603][ T25] audit: type=1400 audit(2000000179.039:606): avc: denied { kernel } for pid=7295 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8081600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs#', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8091600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80a1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x0, 0x40) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000040)=0x80, 0x2) 03:36:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80b1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsH', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:20 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xc0c00) getpeername$netrom(r1, &(0x7f0000000080)={{0x3, @default}, [@netrom, @rose, @bcast, @remote, @null, @bcast, @remote, @netrom]}, &(0x7f0000000100)=0x48) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000040)=0x2, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_hci(r3, 0x1bbb66e9e5c78ae1, &(0x7f0000000140)="ad71138d01112c4250e9df0f62f357f51aa89bd1cd5982784f078709d20be157e4a1397bae6c899d5630df23cb20ac750b62ba0a5422c15a431931f1cd28150233e8f69c2a1836384555655b7d7d2a85854896a9593f0d52995e6b84b561a9761f5725a4f49d15e50d250d511b5b0cb2682bb9842d8c5701534b27941255f10b8811a718c30e024b1935bfe19b0693f487c55c0fddb9e96b036c787d1fb8218910ef95a4b7c7cc084c0ef018eb045c9e7769b1ca") 03:36:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80c1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80e1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xfffbffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsL', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80f1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:20 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8101600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:20 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8111600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:21 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000480)={0x0, 0xb0, &(0x7f00000003c0)="c05d478b038a9561e12c2bd86e56f1930a1f6e3a5772126dfeb08868fbf210cdc9ef5ccb995de1c5d70c0a45f02d2623daabeeeac00eedf5ef6cf42e7cc1e9852bc455eab7f14def858f7c4be5b34eb73363a007f4b70004270ea1896b4dd863a42d181539411b996b1e2348cb47a49f17537e6057c50508f3e3876d7385ba332753d7156c01ca8292d3f1169f3630a9cb3f0baa342ad13797ad7ffad26dd3c1e9c3ecfda45ddde0d00b70a58e1d2da0"}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400400, 0x0) sendmsg$inet6(r3, &(0x7f0000000380)={&(0x7f0000000080)={0xa, 0x4e21, 0xe29f, @local}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b8b3cad61b77c5d7c0214a1c4e1fb5fff873c19aa043af3841e2f207dabff237b38e69af951e7bcae6aedeea99a59f52d31cc11329093be674843b9e48802ba650485df57140b00bfda8cadaa07e8b42a30f00f72fa1e21937df30bb6eb44f817377783930edc057f4d0589109f8df8c9708092e60c6be303e82479f2185d90422e1eff6707dbc5ddc6503194f357c35d15a3b992ea09d2cc1bedf5c026c872ecbb19fe87d3a6a5cbfa2031b83c715aead627d2d6d31d2f902d5a7bd8b767a2e5c94e2", 0xc3}], 0x1, &(0x7f0000000200)=[@dstopts={{0x30, 0x29, 0x37, {0x88, 0x2, [], [@hao={0xc9, 0x10, @empty}]}}}, @hopopts={{0x58, 0x29, 0x36, {0x2b, 0x7, [], [@jumbo={0xc2, 0x4, 0x6}, @calipso={0x7, 0x30, {0x7, 0xa, 0x80, 0x1, [0x3, 0xfe00000000000000, 0x100, 0x3, 0xdffd]}}, @jumbo={0xc2, 0x4, 0x9}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x0, 0x8, 0xfd441f5d434282d2, 0xf, 0x0, [@dev={0xfe, 0x80, [], 0x22}, @local, @mcast2, @ipv4={[], [], @broadcast}]}}}, @tclass={{0x14}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x32, 0x4, [], [@jumbo={0xc2, 0x4, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr="e55ab3e77cc9c2b3156bd8dcec97c101"}, @jumbo={0xc2, 0x4, 0x2}]}}}, @rthdr={{0x28, 0x29, 0x39, {0x28, 0x2, 0x6, 0x73, 0x0, [@mcast1]}}}], 0x160}, 0x4000000) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8121600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs`', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8131600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:21 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0xf3e08b47ab609f16) 03:36:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsh', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8141600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:21 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='\"ap=acorn'}]}) 03:36:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8481600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsl', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='%ap=acorn'}]}) 03:36:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a84c1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:22 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000040)=0x4, 0x4) 03:36:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a85a1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fst', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:22 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn=',ap=acorn'}]}) 03:36:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000040)) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8601600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:22 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000080)={0x1f, 0x6, 0x7, 0x9f55780ef62c9adb}) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f00000000c0)=0x2) 03:36:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8681600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsz', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='m\"p=acorn'}]}) 03:36:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a86c1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8741600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='m,p=acorn'}]}) 03:36:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a87a1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:23 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x20, 0x3, 0x4}, 0x7f}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x4000) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f0000000380)={0x7, 0x0, 0x18002, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r6, 0x40106436, &(0x7f00000003c0)={r9, 0x8001}) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {0x9}, 0x0, 0x2}, 0xe) [ 590.329653][ T25] audit: type=1400 audit(2000000183.569:607): avc: denied { map } for pid=7546 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 590.406620][ T7551] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 590.427194][ T7551] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 590.451280][ T7551] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 590.451330][ T25] audit: type=1400 audit(2000000183.619:608): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 590.498043][ T7551] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000200)={0x4, 0x0, [{}, {}, {}, {}]}) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x202, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000080)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_SERVICE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48ac37f380004000", @ANYRES16=0x0, @ANYBLOB="21092cbd7000fddbdf25030000000800060007000000080006008e0c0000440001000c0007000c0000000500000008000600727200000800090018000000080004004e22000014000300fe88000000000000000000000000000108000500040000000800050097e4000008000400faffffff08000400f9ffffff"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008cd4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) 03:36:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8fc1600400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:23 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_SET_ABSBIT(r7, 0x40045567, 0x3) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 590.660542][ T7551] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 590.668372][ T7665] Unknown ioctl 35307 [ 590.696346][ T7667] Unknown ioctl 35307 03:36:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='m\\p=acorn'}]}) 03:36:24 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000040), 0x4) [ 590.799980][ T7551] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:24 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) [ 590.828379][ T25] audit: type=1400 audit(2000000184.069:609): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 590.862216][ T7551] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 590.880473][ T7551] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 590.955985][ T25] audit: type=1400 audit(2000000184.139:610): avc: denied { map } for pid=7677 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001800400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs(', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:24 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x2, 0x6, 0x101, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x19\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000340)={0x3, 0x0, 0x19, 0x1, 0xc8, 0x39, 0x3, 0x2, 0x2, 0x0, 0x1}, 0xb) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000040)={0x3, 0x9, 0xcc2, 0xfffffffb, 0xfffffbff}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:24 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, &(0x7f0000cab000)=0x1) capget(&(0x7f0000000100)={0x20071026, r2}, &(0x7f0000000140)) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000000), 0xfffffdf1) 03:36:24 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma\"=acorn'}]}) 03:36:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8004000400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 591.316623][ T7799] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure [ 591.407087][ T25] audit: type=1400 audit(2000000184.649:611): avc: denied { map } for pid=7808 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8006800400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:24 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma#=acorn'}]}) 03:36:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs)', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 591.558965][ T25] audit: type=1400 audit(2000000184.699:612): avc: denied { watch } for pid=13000 comm="udevd" path="/dev/loop2" dev="devtmpfs" ino=583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:24 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_selinux(r2, &(0x7f0000000900)='security.selinux\x00', &(0x7f0000000940)='system_u:object_r:sulogin_exec_t:s0\x00', 0x24, 0x1) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000000680)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x2, 0x3, 0x3, {0xa, 0x4e24, 0x0, @rand_addr="bce022bf65336f0b0f77f8d6c611471c", 0x94}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0x88, 0x0, 0x2, "fe8c9b1ac45209162ae137584bfd0db1b5b4f1bde7c4d90b3fa68d96359d1a57382665ed3754538a347bd2fb942ccfc756e2b6186c2bfa28fc8ff67543e441fee1601583e227d138def9249eff6acfa35959f1be264289af8bc335868e1e252843f6a1d72228bf54d49349825b9ad8d8e0a174d6fae0088f"}, {0x68, 0x103, 0x8, "75694aa1ef44bea01e6f0c5175df7665345715a300bd97466189a05cab054dd55e00be071be39cbf1af40a5d0abbdfeb0cf95d3e6d807f6a9cb1650dce17e1ff8eca191dee45411091d5ed74f39c1fa52717df"}, {0x10, 0x15, 0x2f2}, {0x80, 0xd59210d5779aa071, 0xfb31, "2212adbc8150d7de2000303dbdef1b171fa02fe4017d294ae0d8fa86234bef44d8fc700f675b89378b93d1ad034c42157fad7c49d5f8603bf44a52b56e0eecbca3c70aeb4b7eba5c498ddef521552543db19c3be6e909f299e9a8aa62d82d52dcd9195aa3759f6271f98"}, {0x38, 0x1b, 0x8, "f2c58e7c550efbb6c8604e3007f303a0e154cdce229af11876e1d8a21f4b6cd0aaed0eaae0"}], 0x1b8}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000380)="b7d2ebf9c3dff25ab6b8247a96821f536f024235040452191b14983a45d682b67bacfd7faaa8d0d902f7f441bdf0d5ad2c58ade794db998ea2c7dcb804a29249d5226df6a0b2da014ba4ab71e773a1dfd50254afefc576757d0cf4c1e40e30497e37b3014a3d5cf9d82223c85fc8ec9b15bbe5c3876701e311fe40658af6a671b9bba8dc6ef135e9314b", 0x8a}, {&(0x7f0000000440)="6189fc58cc59e6a7ce73cf5b826675c5b4e5cd7d1deb8ade05b61a20a028ba5ec5e506c382b50f263dd031fd651ccade446379baf013fa3a5e759dcca19c2726c0f1d4df43f773cd03835603d9d44d69a5ea4e6ee6", 0x55}, {&(0x7f00000004c0)="bc2762a8d48e3461a300b4a1ba3b6fd59b75819c95797da830e20cd2cb1bdb6345eed250a8c29f9721d1095cf0b1e41e61df5d2959127e6b54a961dc1f8d056a8b92703f44578fdc1df9ab76cf8091c92d036bb2dad896b694ebb6b6bc2b09676a0f6c7b9b282f2d6ded333919e00d1410be2c772a1a11a63e8944df93999b107865d321825ac91fe4cc376462d4731c3e47ba0493020fd458252b08963b", 0x9e}, {&(0x7f0000000580)="cd0fb128e03ff35510c360fefdb86e43deaaddcd6b5b4d6d40698fc120b6a3e484f39cb3d6742febc274432fdc6460a900b7b5074069194ec2", 0x39}], 0x4, &(0x7f0000000600)=[{0x70, 0x3a, 0x2, "87ce5f7b985b1ff8fbb788c07da49b224b72af36acdbb407da298cbbe196aa8250b6e8ffce1b62efab961c6357f32744a36f8fbc5869c527ba5456d2ca29746e9efd5525e8ec8fda4af3e51770ea3368cc19f7fed7ee865b1c"}], 0xffffffffffffffc5}}], 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0xffffffff, 0x4) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ocfs2_control\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f00000007c0)={0x2, 0xffc1}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r5, &(0x7f0000000040), 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000800)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000840)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f0000000880)={r10, 0x7fff, 0x9, 0x1}, &(0x7f00000008c0)=0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000740)=r7, 0x4) r11 = fcntl$dupfd(r4, 0x0, r4) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f0000000700)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x80010, r11, 0x100000000) 03:36:24 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x7, 0x8, 0xc9c, 0x9a}) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8006900400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:25 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x140000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)={0x6c, 0x8}) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000)=0x500c, 0x260) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000100)) 03:36:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma%=acorn'}]}) [ 591.792709][ T25] audit: type=1400 audit(2000000185.039:613): avc: denied { relabelto } for pid=7930 comm="syz-executor.4" name="TCPv6" dev="sockfs" ino=114882 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sulogin_exec_t:s0 tclass=tcp_socket permissive=1 [ 591.899249][ T25] audit: type=1400 audit(2000000185.139:614): avc: denied { map } for pid=7930 comm="syz-executor.4" path="socket:[114176]" dev="sockfs" ino=114176 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 03:36:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs+', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8000500400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:25 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) dup(r0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000040), 0xffffffffffffffc5) 03:36:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma*=acorn'}]}) 03:36:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001500400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:25 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RVERSION(r2, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x2, 0x8, '9P2000.u'}, 0x15) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:25 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xe4b095831f63f069, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000340)=0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x8, 0x400) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x57, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0xa0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000001c0)={0x1ff, 0x0, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 03:36:25 executing program 4: syz_init_net_socket$llc(0x1a, 0x6e0e6faf878a0216, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040)=0x100000, 0xfffffffffffffff0) 03:36:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r4, r3, 0x0, 0x100000000000002) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005804000000000000300200000000000070030000700300007003000004000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000e1ff0000000000000000000000000000000000000000000000000000000100000000000000"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000000ff07000000000000e0000002ac1414aa000000ffffffff00aaaaaaaaaaaa000000000000000000000000000000000000000000feffff00000000000000000000000000000000000000000000000000000000000000000000ff00ff00ffff0000000000000000000000090007031800010007000076657468315f746f5f626f6e640000006e72300000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000800000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000017f00000100000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4a8) r8 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r10, 0xc0605345, &(0x7f0000000200)={0x8, 0x0, {0x1, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0xfffffffffffffef9) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r12 = accept4(r11, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000040)=0x80, 0x800) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r12, 0x110, 0x3) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001800400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:25 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) connect$llc(r1, &(0x7f0000000040)={0x1a, 0x9d, 0x4, 0x0, 0x20, 0x20, @local}, 0x10) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r5}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r5, 0x8}, 0x8) 03:36:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs]', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 592.779765][ T25] audit: type=1400 audit(2000000186.019:615): avc: denied { map } for pid=8198 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma+=acorn'}]}) [ 592.937207][ T25] audit: type=1400 audit(2000000186.069:616): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8006800400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:26 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000)=0x77, 0x4) 03:36:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x6, 0x5, {"70db560500000066157b5400"}, 0x1000000000000004, 0x7, 0x20081}}}, 0xffffffffffffff52) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x1, 0x2}, 0xe) r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000340)='memory.swap.current\x00', 0x0, 0x0) 03:36:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma,=acorn'}]}) 03:36:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8006900400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:26 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000040)) 03:36:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs^', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:26 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='\x00\x00\xb1\xcbhA\xb8\x06,\xe0\x00', 0x8001, 0x0) setsockopt$rose(r1, 0x104, 0x5, &(0x7f0000000040)=0x100, 0x4) 03:36:26 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) kexec_load(0x8, 0x5, &(0x7f0000000300)=[{&(0x7f0000000040)="23bdedf8a68d8104e8bd8746dd4004d4e10bae197c31e41867a0dfcd54e6ab3ee65f96faa31089f7435a42502c9dcafa3772f1e9", 0x34, 0x80, 0x8d}, {&(0x7f0000000080)="5b02b8bb6977b3786b217dad49c385c597abb1ff2c51d998fb06873bac8ad97ba87407999f3c9057a529d8390c546219c18ffabbeec2a22ab10563782e1b334f56cce38b117f30ea514fa22c7c2d3bf1d87ccd9128d62337db638a8068060d152a5eab7aa8b360d49fa718fd68b07cf868d094bda454c02b3d05a8c349814866159115c34fdf5e31c315d9273dc1510a155dfcb8b5ff71e42a88d1a59b03a7e2059d49e72e23fc7de57907fa3fa222d03c840afc8537fb5af54ac1cc34cbbe5a6f5795532b66164a11315bcf76cf5e2c", 0xd0, 0xfffffffffffffff8, 0xfffffffffffff5d5}, {&(0x7f0000000180)="3c5f344c9abaea0f29db6023d5217b3364553b69270b0eac7ed2d6bff65d046146424b12e685ab27af4eada02a0124bbdeafd2792cb0e341a35f0568b161540d7669d137bb702d54838e150223fa46d6560cc0029eccea8a6cdc13fe", 0x5c, 0xdb, 0x9}, {&(0x7f0000000200)="999520f2d8134b5ba5d0b50c06a4e9c351951f11608499939fe1f9150da4cd634ab4a3e66ac07253abea73865109d8c4dfc9fb3f6598f472f942676ce88ba05d2c78b7e7a87a65bed96fc5720dbfca466cd6c90a03daba531da680797b6134d5c88d19ed743e605ed48bc507632324bfd536cc07f1037a8a652942104c4219c9c4897719349c7f3ed8a130769b40a6fbf473b3ab884768e4520618f119", 0x9d, 0xfffffffffffffc00, 0x8000}, {&(0x7f00000002c0)="1937dcf915c4e54a7106e07e4eb901bc8fce0197a161", 0x16, 0x8, 0x9}], 0x320000) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r1, &(0x7f0000005980)=[{{&(0x7f00000003c0)=@sco, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/48, 0x30}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/189, 0xbd}], 0x3, &(0x7f0000000600)=""/85, 0x55}}, {{&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002940)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/145, 0x91}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/190, 0xbe}, {&(0x7f0000002880)=""/177, 0xb1}], 0x5, &(0x7f00000029c0)=""/180, 0xb4}, 0x9}, {{&(0x7f0000002a80)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002b00)=""/4096, 0x1000}], 0x1, &(0x7f0000003b40)=""/236, 0xec}, 0x8}, {{&(0x7f0000003c40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f0000004040)=[{&(0x7f0000003cc0)=""/19, 0x13}, {&(0x7f0000003d00)=""/92, 0x5c}, {&(0x7f0000003d80)=""/130, 0x82}, {&(0x7f0000003e40)}, {&(0x7f0000003e80)=""/28, 0x1c}, {&(0x7f0000003ec0)=""/217, 0xd9}, {&(0x7f0000003fc0)=""/3, 0x3}, {&(0x7f0000004000)=""/19, 0x13}], 0x8, &(0x7f00000040c0)=""/244, 0xf4}, 0xa0}, {{0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f00000041c0)=""/196, 0xc4}, {&(0x7f00000042c0)=""/168, 0xa8}, {&(0x7f0000004380)=""/211, 0xd3}, {&(0x7f0000004480)=""/203, 0xcb}, {&(0x7f0000004580)=""/200, 0xc8}, {&(0x7f0000004680)=""/178, 0xb2}, {&(0x7f0000004740)=""/69, 0x45}, {&(0x7f00000047c0)=""/149, 0x95}, {&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/24, 0x18}], 0xa}, 0x7}], 0x5, 0x20, &(0x7f0000005ac0)={0x77359400}) accept4$nfc_llcp(r2, &(0x7f0000005b00), &(0x7f0000005b80)=0x60, 0x0) 03:36:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma-=acorn'}]}) 03:36:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600030008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000500)={{0x4, 0x0, @identifier="20a012a42ff8c509ab55fa80c0d4d8ca"}, 0x1000, [], "bd5b5f24853bc40c15dfc9f0b739205d0808e7634d5e33460e4ddef8737e8da3e75d980e54e076e51b94a6d2f49ed075699dcfb1e4efafe0af287050b158b5f8490d10f18c9a3acc273d8e7cd37def18ef137b6023686b04e660c46c07edb38cc14e63a2d7a84f093646e63a199d8504cd8dabcbbd8053ba9e3b3afdae4907b9b1df384151cd4d72213c2d46aadcaec5c5027853caf00673ed89f766a18c4d7ecc7552a4e424735dfad73368b633ff0ab358a36cd691a26b42ea384b2993be64df8de25ed4984884c4f6c5a5f67e17b73c969c1ee8663a10c52eebff849a3a85b7d38641c12170b152c6136d0a7079fe31c8a1723689e7fe44951a2729c2efdac222895c06d85ea507cee927c50b229477c74a3900f94363ca17bf97705fd84f4674e22b4686b69e40472e4548cebcbbc2a56f84555ca56866486d12a644846496d1fb7d7e7b2dc557863a9650e181264ddffd0194aaa657bba75708336555831e77903e30569894527c80aaab736e078238146f8e4c21df4f7d36be8b73f44c7968f63397ef08339407bd54329c4539c9139eddeb4860d3d135eb6f2540a0810024bc752563408303f1fee7f7368078a1ccdd47255ffb51594053bbbe8107d5b46940318d0566cd40cc237a396f99d53d29ceae497c84cdb14e17666a2d1ed5a7f10696f6919b7fb0ee4a273b2e1f1363d6857fc3c0716bf934f6c5fb18966f7d1858141764c07e0a8eaabddbc7082d5f786f5d8b19aa2dea5b1d16a88f2bca1bff8c08d95927e37ca768f6dcdd4cc9e07241283500191824549e251f30521ff65ee6ecb62720d1075b523c32465728948f970428d375ad852c5f05206e753f81ac04823d58b7bb3784970e4153c35d8b06dade9c639ca7e13175f429381655641b46685005323d74f5502a5d5ce85dea4919da2346cfb75b04586fade7958e46d9052b77251487115fb2beec145890947c84dfde906827e4c85d05d5aac342c6046eb4ef746832973f7a6c594385d5635f35feb2e1bf04097ac9d2c441294ab5756a1f7b96efa50ade95c24218f3e3d71f45d186fc048909a754ecb488adeb88b67a6aa4371e6c432d9dacf8fb2349c721842ea5bad0026843d9d3509a2ce8ba41d743f6d39d6e24af011495bf466760b81e756e136aed1168a6ed911662039d67b3034aa5b26bde38c1a896982f84e897d01c769d25656721827cfe22211a4b1eeb9edd87797d7b6f5325104203ec06cbe6047b80bc81d3f61b076e1aa209d26e3121645201dcee1076bdc2e5f4d8fbd3a09bc4f56e9885e107f66fe1c17f2fe5c69856500c273e969aa8512f0ee26e43db99d51d7ccf2e6868e5244297770725bab4357725baa46572097843b2467adb74fd011154b7afcefe06e04d90ff3d5993cdedba14540cc7cffb6f097af25e53525667db6ac0dbf54eba02e399f30794956a34c780087a078f4c2235004eb766fd9fcaa08877ac97e85c2d00d1d8b3085212340b8811ce8cbd1342e96f691189ef20c07aa14fbd3c166b41b495ee59674e14060a921adb5c90e11cb029c6d923e676c3bc11aba0d5fdbdc12c08ad9c40ace881361b30f411de5e4306508092ba7b77b787b563d99986fcb43c0d1fec93d3bf5ea36339283bedf7e5bae4837c149666217d6b26308c3595ed1505eb37e2c056c2e5c775f3d81e3a3dc60a550ec7eaef6bccfe92549d9bbb17c66e8f8f72c618f28dd9b454c676a938e79f237de2035718d11e06eb19599b418f991661c043c403334ec8adfff95b62c9ab7a485734b714bd726f5964377de30497c0cc637fc97b7c637b1f8eb43ace5b732e708c7473fb9dee64d0d70d64f7e677c752261bec1432d21fb72604419fb3d53437e90604f3f40f928c985e81546b3325df7ca86bb7af20ab2e52fe588335976c0d9f38d5100b939bc23048446ac99cb27c548d8baee22854d83e81f6b9e576d0ce206f51a351398473cde42ff86fee0bc26afe724a55f5da12daad1cbcfba36dd70a0942d2c89074a1cf297f0e48be81ea2f17e10cd3e94a5ef235cc2e1d99ed8307fe37f3e84b2e9776541c5d5ee15573f965c777e44a7902a8c3acfe1ab3755a75774298ae0eacab70cde5c4daf17291ae0368aa1aae0d1761d61c81366894ea025c08b971cbd4aab5f6683d2348da600fef8a0720e5b005f40d88acf1e60604a7fd55e7f84b92e48773d87d66d27b532a41aaea205792c943e185a8a92cf2a2c7241cfe68ea82eeb52ce48f30b2138ecbb6f4bf07481b5a5b93ce8ace5e927932d21047216ffca17c0c013c1d289f01a3096d9d91140da3527c6b796a1854187af4582b365ad4ebc19aaff68abd2ad82033a35c2c62081031e0271868d90094b28abeeceba5b2162845efd051e9fdd4261e0f4c65e36cd031b14630370e98a4d1a6db9d1d7f8a1f5caff7f836ca352e2ff0806e0f193f4076d59823addf7310ef701d4f2d48231388a477e80b3a9f082e34d5e5fce837e89868b2a0a85d6d86281425e61540de994cf7c43186219f77ab591fee81e6bfadc8ef342f477956a24bff5a5605b3394ea1af244f1a807579cac0efe2c0ac9f585b31acc01c89505d5781597c092643ac23df221541c08eb3e68b274f4d319882e7108fad3aabfb6ac282cab23177a17f91d876d3228f2bf5f8fb4d8cab9d8f8a55b7db5daf4b992b7516050a8bf5e4e5b0b67451f1326b7a3367088afd5611fbef023963ccbef414df2526976bbeeea06fb234934c8db87c3d1d416e0d97d4051581c92567bef79c0cfb2f1be001a59c19761b10cdea8bec325c54bdc57258c8a15368dc6f0798569d8094d1a7938d0d24a5cd0812b8a1dd0e61bb7244075bfec1a460728c7811aa1170069d76718a06111876fa5e29489d9d0921f9cf5f9fd0cf1825e1cb74a5a775e24d0739b07d3602e54d93109ded500713763fa07fb5e1114dae3f028fdbebf00d599ef06d570f2640f586b18e1bfe61bf2c742a163ea5823f60597dd6aa900fee45981b21dc4d78504db3f5150b0a594c8aeb97e17d958c1a8468b92993d2f34de346d83d8117fd2e3442302b9fc36c200125611ebe27c6365e1d7de3d5329f506571758044c728d4916a15df4cc0cad4e42ddf87194a333d3d03f1de06eb4f4e6463dd0938501117bde64e06bf9aa67998c02feea4f71984ef8628210305e18a888b189a5e19625049f3999ae0b88a41ddc034afa3beed4cbd35e1134d5468cd4ea718f71d8444b175b15c894d37c821bc6c80e241bcb85849ae09f7ce194478a63f79597ffc80c6115cab01a2d498f5515c2179f0f30b9a09fa7284addcc12462a388c4933e858936b979a298091fc5f355872855f077d9e09de41e14431387a541b408b08b9c4671e67b1d4d56ea2edcc77fdbcfa53dad80952c4cb75609b4a3909ed0301e45b1699fe82fa25e93e22fa4f27896dd48aaee51cc8088f645c69c0a4ca5cae207e94ba0dd0b96bbbec6a0b2a30d022cd8b781cc15104a0f42958615a58107aa23aa1060921dd4fee69dda0f016d938e08ed746d32e73235b0ab8324b514d455ae8dd5e0b8939c376ce91586e12a954e1c9cb316b18eaec0ddb0d8487f234f137122df0ac39a8f8b71aa3b5b3eecfc33050dd6dc6f53255933f73d9c6d267f5a32d368169894e3007699366cb2d122204fe8a2816443583f552cc7f8efae861599d9a31bb31462bc3e7c97a6abe3c254e3e6fbc2328b4caa79266269c6112e6709eed33fc72dbcb24c358174a154d97fa4c2273c5a20c4c23937361677fc12d18a8a4090321a9cbe6a80f4431053b2416cf3f06c2ec31a926cec8120114a88bd1d3e31a0e0e77feab5713ac6218a4b4d216743c976889ca5aa035ebcd47f5b7b7c266b77e1211ba45bcd801ef7221793c4a812ca8925f0c74bcae3b34d838491bd3d2fa598d1aa9f55b2d0e543743c9b8b0daa53c48ec63b87d15a8b0625f1be22ae06c9f6fe4e7994c1deb8d0986d8350af25d1e8c985dfd9d60d1964773d0e4ac3f424e32fedcbd3ccb86d8b111d98df225a91389c9ac58afe244e0610eb847199db3c1c44fce28032ecfca8936d7461560e852e0068cb898c24af9ec86706065897584b80c315cb3692e34b08cde7bf529cdd369546002af274face21505945b61fd33efdf55cb88a93579067f01e6c9385b215e0f65de2cc247c07a39238caa3ad6a0ec6cd3a575f420848663a0096fedc15bef52a92725bb3efcfd115e793934ebee6c3de87d487cbdd97a3249828fcbb98c398782458fe5d1fef27415c452e47fbfa2c8483aa7b6ed52be460cd3bab8ffb2621c8f066f1bd1c8b0e564384d7ad885f5a4984012784fd990952c975a47a1cda400d910e1bd7833ad743912d6110b7eebcc76c7cb3e60e86f80545fcbe31270b16649e7657f16d815f66cc26b4031224d4d306aea08505789c5e072024af8dcacb04da92597b6c1ff8a6df964161d120be8cda75c5e7629b9bfb6d14dc3506ab71d9f60c09d3ff09ca6300ba286835711a96bd99605f26cbf0419f42e8388317963c4a8880838306167c89f70faf38c7789c35da7973cf60caf8751ec665e0f55b704760bac8081a77cd43ee693da4427aa777c7f3d05543a850b9aabbcfa8dfaa8617be0a9d42daaa75ae23688dedb26056e2a54d426e73a169ad50369a76be15bef06f2b9b7f1fb3a17e0b6c4c6fe3a50c7e61a0b8dfa7d65b78aac8a02310fc00f48860e4587df484ceefe11b5c3df5e4695e8f39cea5516b07393f2c9addde8413375f6734920a8ac2832c64c9f9b6b5b951473d34e2bdfaf2d9d107c7a1eb105bd8092b8b2b695a81b627eea58c1844999c71114b048d7bf78ebb13499ba69d65b182de4cd9d8aa463109001936993dadc2c4765e112763422214b9a0d10bdf21bcbdae6537b775b2391e2454c71378bd7d757d2b17748adee00695dd39304326c1fe281198c7d1ffcdb51fb160b8703c7df29d1411e85e8d968a467339897bd16a3ced9f769402966fc98e0da5d4073ea252622da9cac8e242a81ba3cea9be39aec9c94a1105d93450fda0a93c8c4f164fb134e3e65ab3377ce7820a640e387ed9149087b0bcbeef0bf88687e6ee83d47b533d7bfca18dadcbaa79dff4b51a3d68bcae28f5e7aeb136813a26c661622e8ea5359218f2d7c66e12278aebc1a61cab0e64c84339017fc987596722eb7012835c07c4957d32d0253143c8e69aaa53b473f54b23471ea9599e7302066313191997916445df1ea60562300c2f9a37b404b332f7bd78f38af72527de75a5128dc141c3270295be96d7e8acee20ccee0b16f8e29c24bd54202041d8b59cc50bb8eba961c4ad9335e5db02bcca233aaf7d4551f2a6df74e819b5febfb88dd0461432c962b98fb834457ea74da5a4e21f90bf25d669442654c0f2f1e0e31b6ade98b321992a150a7af8fab6dd9605add3afd018ba4e5ab49ea1a1b98bc5850c850072a969d430017668aadba166326c0642df199518267150b01559982b3f4b98c08aab2a21ca5f95fee7d0f7f93c8552d15a29255445ba70e233ba820b2ff73f07bd63ed0b9e9fb1ab476aab696323dff87267b584b8194c22b1408d81beca0409e3ed429b9d8f4f58e9853850e18a764a7880cb246ecfa2a2d2692c2ac2e55489fb41e815b5b86acd5bffecc9c98500eb97eccdef905d1675bdc58e390764658a7d2844e62aa0b5e3dc338b735b392abc3bc9f63b9d57da66eedc1cf26460e77242bbaf03cd43b70a2e6f9f91c46cf102d2e12f9970056a6d63a3fc15b91da0"}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:26 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r4, 0x1, 0x1, [0x8]}, 0xa) [ 593.680273][ T8461] __nla_validate_parse: 4 callbacks suppressed [ 593.680283][ T8461] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:27 executing program 4: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000100)='net/xfrm_stat\x00') ptrace$cont(0x1f, r0, 0x2, 0xcf8a) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) socket(0x3, 0x100000, 0x7f) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600050008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:27 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r6, &(0x7f0000000040), 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000004, 0x10, r6, 0x5dcfe000) r7 = semget(0x3, 0x1, 0x300) semctl$GETNCNT(r7, 0x0, 0xe, &(0x7f0000000340)=""/103) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000440), 0x800000000000004, 0xffffffffffffffff, 0x18, 0x1, @in6={0xa, 0x4e20, 0x2, @rand_addr="af2a3703705eaf41ef00"}}}, 0xfffffffffffffe20) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r9 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$bt_BT_SECURITY(r9, 0x112, 0x4, &(0x7f0000000000), 0x2) 03:36:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs_', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma.=acorn'}]}) 03:36:27 executing program 4: lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="8fdc28c06e64cd17ec3d8be2d631ff7b10879e7f5c40f48740692c8d79710fb9ac1cad8f50abf3250d1d65362d17437aae4f98ed6a4297d3e3f29dbf8590b74882e5467193f0816ac16568d3e1", 0x4d, 0x10000}], 0x8001, &(0x7f0000000380)=ANY=[@ANYBLOB='umask=0x0000000000000002,resize,noquota,fowner>', @ANYRESDEC=r0, @ANYBLOB="2c636f6e74097faffa0a0601dff019ad771fce6578743d726f6f740200"]) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) bind$netrom(r3, &(0x7f0000000400)={{0x3, @default, 0x3}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000240)) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000000), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L+', 0x6}, 0x28, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f0000000280)={0xb}) 03:36:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600060008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:27 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x30, 0x3, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600070008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:27 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0xc0000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000040)={{0x0, 0x3, 0x2, 0x3}, 0xffffffff00000001, 0x0, 0xffffffff}) 03:36:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma0=acorn'}]}) 03:36:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs`', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:27 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000300)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r5}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={r5, @in={{0x2, 0x4e20, @rand_addr=0x70f}}, [0x8, 0x101, 0x0, 0xedbf5d1, 0x81, 0x0, 0x2d0, 0x1ff, 0x7, 0x5, 0x1, 0x20, 0x3, 0x3759, 0x1]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r6, 0x6, 0x1}, &(0x7f0000000200)=0x8) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r7, 0x10c, 0x6, &(0x7f0000000000), 0x4) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x443, 0x138c00) 03:36:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600090008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='maX=acorn'}]}) 03:36:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsa', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:28 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002840)='/dev/vcsu\x00', 0x208000, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000028c0)={0x54, 0x3, 0xeff6, {0x1, 0x1b39}, {0x5, 0x4}, @period={0x0, 0x6, 0x40, 0xcc1, 0x4, {0xfff, 0x7a, 0x8, 0x1}, 0x4, &(0x7f0000002880)=[0x9, 0x101, 0xabe, 0x4]}}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000002380)={&(0x7f0000000080)=@isdn, 0x80, &(0x7f0000002240)=[{&(0x7f0000000100)=""/101, 0x65}, {&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/82, 0x52}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x5, &(0x7f00000022c0)=""/153, 0x99}, 0x0) r2 = open(&(0x7f00000023c0)='./file0\x00', 0x2000, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000002800)={0x1bc, 0xb, &(0x7f0000002400)="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"}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002900)='/dev/ptmx\x00', 0x7fac06225ba18461, 0x0) ioctl$KDENABIO(r3, 0x4b36) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r4, 0x10c, 0x3, &(0x7f0000000000)=0x2000000, 0xfffffeab) 03:36:28 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 594.985351][ T8850] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'. [ 595.096991][ T8850] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:28 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000000), 0x4) 03:36:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000a0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 595.330456][ T8926] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'. [ 595.355623][ T8926] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000b0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 595.561794][ T8981] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'. [ 595.581300][ T8981] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='ma\\=acorn'}]}) 03:36:28 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0xfffffffd, 0x3, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000340)=0x14) r6 = fcntl$dupfd(r1, 0x0, r5) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0xffffffffffff7fff) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_dccp_buf(r9, 0x21, 0xe, &(0x7f0000000380)="2aa242d83e9f4d8bf32b5aeb37b0310c70f3e13ac9a2ce6311ad58a8149a3eb9885332fd2f4d751331abeead57de2e9726f93d18385588caed1e12b29eab597f2e5b13ca2dfbeb7bc59288519ab3b7834b9cf40af1a76453fbf99753b1fa87d341f37c871bc8cf0963d0c7ddbca60652f2b759eb7e89868c05d0491fd525b134771416a77270144795d4b299a10bd4da16a9d9245ec2957d71eb1962c2d948a2f9", 0xa1) sendfile(r7, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e21, @loopback}}}, 0xfffffffffffffe02) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_tx_ring(r11, 0x107, 0xd, &(0x7f0000000040)=@req={0x9, 0x8000, 0xd99, 0x94d}, 0x10) 03:36:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsb', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:28 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSTATFS(r2, &(0x7f0000000080)={0x43, 0x9, 0x1, {0xd1af, 0xf06, 0x80, 0x9, 0x1, 0x7, 0x6, 0x8, 0x1}}, 0x43) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000040)=0x9, 0xfffffffffffffec3) 03:36:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000c0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:29 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000080)={0x0, 0xef, 0xfffffffffffff000, &(0x7f0000000040)=0x3}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x24000, 0x0) r3 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20002018}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8}}, ["", "", "", "", "", "", ""]}, 0x24}}, 0x20008840) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x8, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xfffffffc}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$bt_rfcomm(r4, &(0x7f00000000c0)={0x1f, {0x1, 0x5, 0x2, 0x8, 0x0, 0xcf}, 0x3}, 0xa) [ 595.853680][ T9002] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.2'. [ 595.912845][ T25] kauditd_printk_skb: 10 callbacks suppressed [ 595.912859][ T25] audit: type=1400 audit(2000000189.159:627): avc: denied { create } for pid=9003 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 596.011259][ T9002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:29 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x40) sendfile(r1, r0, &(0x7f0000000080)=0x80000000, 0x5) 03:36:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000380)={r6, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer2\x00', 0x69a0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r7, 0x500e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x7ffe}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsc', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000d0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mac=acorn'}]}) [ 596.220028][ T25] audit: type=1400 audit(2000000189.159:628): avc: denied { write } for pid=9003 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:29 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000040)=0x9, 0x4) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 596.351612][ T9129] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.2'. [ 596.476461][ T25] audit: type=1400 audit(2000000189.179:629): avc: denied { read } for pid=9003 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 596.501497][ T25] audit: type=1400 audit(2000000189.619:630): avc: denied { map } for pid=9128 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000040)={0x1, "01948d42d8f8b60df0ae639e4fb38e06e374cbde8c1610e9a89fd710944f0bc29f4e9b373e48dab37a8ca1def93ddc1287e8f805f44c7bb7f27d56b7cb7e10a47ec7e295a2cdc7d605285e8937a99c010ca3265e250d41891395b20cefd01ca98c35def5e6027172e61855ff1278b214c73a203c54cc43aeeb31a56fb41d6724"}) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r3 = accept4$llc(r2, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x80800) setsockopt$llc_int(r3, 0x10c, 0x5, &(0x7f0000000000)=0x67d5, 0x4) 03:36:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000e0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 596.538245][ T25] audit: type=1400 audit(2000000189.629:631): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mad=acorn'}]}) 03:36:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000f0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:29 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r2 = dup2(r0, r1) getsockopt$inet_udp_int(r2, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r3, 0x10c, 0x6, &(0x7f0000000000), 0x179) 03:36:30 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x408081) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) 03:36:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x8) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r5, &(0x7f0000000040), 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) sendfile(r4, r5, 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x420040, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsd', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600110008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mai=acorn'}]}) 03:36:30 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x80000001}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000000c0)={0x80000001, r3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000040)={0x1, 0x0, 0x2, 0x7, {0x37934588, 0x0, 0x63a7, 0x1}}) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600120008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:30 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20c0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x8, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x4}}, 0xffb2) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xa1a, @rand_addr="7ba0aa0c89f85d09a141aa0611658a9f", 0x80000}, r3}}, 0x30) mq_timedsend(r1, &(0x7f0000000080)="3e369b46a63a0c44fac30316019321b718c8ae91ebbab23623e872f876590b5a0414523c870c18c2cd5664377fd75e9acf6ae5450c3d333c012720570d8af613d5433f9fe4109933450f33b5a776b98a2e7354f32958a59293f4927291079d0d2eea014c65e0ec1ae4fa9e49bcef852b0e67", 0x72, 0xfffffffffffeffff, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000440)=0xc) sched_setattr(r4, &(0x7f0000000480)={0x30, 0x5, 0x3, 0x2c, 0x1, 0x7fffffff, 0x4, 0x101}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x5, 0x0, 0x40, 0x2000000000}, &(0x7f0000000540)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r6, 0x84, 0x19, &(0x7f0000000580)={r9, 0x9bb}, 0x8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000004c0)={@local, @multicast2, 0x0, 0x1, [@local]}, 0x14) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$rfkill(r11, &(0x7f00000006c0)={0x15fa, 0x7, 0x3, 0x0, 0x1}, 0x8) r12 = accept$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) r13 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000640)='/dev/nvme-fabrics\x00', 0x200000, 0x0) bind$isdn_base(r13, &(0x7f0000000680)={0x22, 0x20, 0xf7, 0x6, 0x2}, 0x6) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r16, 0xc0505350, &(0x7f00000005c0)={{0x6, 0x3}, {0x9a, 0x1}, 0x88c, 0x9, 0x25}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r15, 0x84, 0x22, &(0x7f0000000280)={0x2, 0xa, 0x81, 0x800, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r12, 0x84, 0xf, &(0x7f0000000300)={r17, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}, 0xf3e, 0x401, 0x8, 0x9e6, 0x8001}, &(0x7f00000003c0)=0x98) 03:36:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fse', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000340)={0x9, 0x4, 0xfffffffc, 'queue0\x00', 0x6}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600130008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 597.611593][ T25] audit: type=1400 audit(2000000190.859:632): avc: denied { map } for pid=9412 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 597.777445][ T25] audit: type=1400 audit(2000000191.019:633): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mal=acorn'}]}) 03:36:31 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000001080)={'bpq0\x00', {0x2, 0x4e24, @local}}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) sendto$ax25(r1, &(0x7f00000010c0)="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", 0xffffffffffffff87, 0x24002880, 0x0, 0x0) 03:36:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600140008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:31 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) 03:36:31 executing program 3: timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r6, r5, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000200)={0x6, 0x1, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:31 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @ethernet={0x6, @local}, @hci={0x1f, r1, 0x70e9e965c6c7c7d0}, @nfc={0x27, 0x0, 0x1, 0x2}, 0x545, 0x0, 0x0, 0x0, 0x101, &(0x7f0000000080)='hwsim0\x00', 0x39cf, 0x80000001, 0x3ff}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) [ 598.020125][ T25] audit: type=1400 audit(2000000191.259:634): avc: denied { watch } for pid=13010 comm="udevd" path="/dev/loop5" dev="devtmpfs" ino=586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mao=acorn'}]}) 03:36:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600150008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:31 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000040)={0x300000000000, 0x9}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x800, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f00000000c0)=0x1) 03:36:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000080)={0x2, 'lo\x00', {0x9c}, 0x3f}) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="48348a4707e7fefafc9eb7df7221ae27", 0x10) [ 598.145124][ T25] audit: type=1400 audit(2000000191.389:635): avc: denied { map } for pid=9549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.201130][ T9550] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 598.237751][ T9550] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 598.343679][ T9550] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600160008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mas=acorn'}]}) [ 598.389140][ T25] audit: type=1400 audit(2000000191.629:636): avc: denied { create } for pid=9566 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 598.390916][ T9550] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:31 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x1, 'veth1_to_bridge\x00', {}, 0x9}) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 598.603374][ T9550] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 598.642404][ T9550] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 598.671977][ T9550] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 598.692544][ T9591] __nla_validate_parse: 12 callbacks suppressed [ 598.692554][ T9591] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. [ 598.716034][ T9550] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mau=acorn'}]}) 03:36:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 598.841875][ T9591] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. [ 599.115571][ T9609] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 599.168693][ T9609] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 599.229631][ T9609] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 599.248475][ T9609] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 599.339136][ T9609] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 599.347678][ T9609] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 599.356516][ T9609] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 599.364752][ T9609] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600170008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:34 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000), 0x4) 03:36:34 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) 03:36:34 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='max=acorn'}]}) 03:36:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 600.959320][ T9726] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="bd7c389dbfec81ef", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mmap$dsp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x24253, r7, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r5}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={r5, 0xfffffffb}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r9, r8, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0xc0605345, &(0x7f0000000380)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0x4}}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000440)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000400)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 601.011426][ T9726] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:34 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={r3, 0x1}, &(0x7f0000000080)=0x8) [ 601.058563][ T9728] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 601.066730][ T9728] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000040)=0xff) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 601.111231][ T9728] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:34 executing program 5: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600180008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 601.166762][ T9728] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:34 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r3, r4}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'dummy0\x00', r3}) connect$can_j1939(r1, &(0x7f0000000180)={0x1d, r5, 0x3, {0x0, 0x1}, 0xff}, 0x18) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) [ 601.250358][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 601.250374][ T25] audit: type=1400 audit(2000000194.469:638): avc: denied { map } for pid=9737 comm="syz-executor.3" path="socket:[116131]" dev="sockfs" ino=116131 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 03:36:34 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map\"acorn'}]}) [ 601.346477][ T25] audit: type=1400 audit(2000000194.509:639): avc: denied { map } for pid=9749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:34 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x6904) [ 601.503537][ T9852] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. [ 601.522348][ T9852] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 601.531383][ T25] audit: type=1400 audit(2000000194.569:640): avc: denied { watch } for pid=13000 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc10c5541, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r5, 0xe, r4, 0x0) r6 = syz_open_procfs(r5, &(0x7f00000001c0)='net/pschSd\x00') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:34 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) 03:36:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600190008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:35 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)="8510207c6c1259ab96df8e8a651b594cc3aee1590bd3324c54546957bf5a5abe92039650054e3e270bda506add505153bc33e7283706cd8312c330ac8fe2ec97ed180fe3eee6873d2d460ff3fdb15ffc72c6c4104aa31679c7da5bd92169efe900ee16f35e11f96831f47f", 0x6b}, {&(0x7f0000000140)="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", 0xfb}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000000)="ccb7007c3d147d489ada23deffe5f02e80838fe445ab61d5ca0aa62c29277e70328c745f7de3d81039596c994f4f1b8de2cc63b9", 0x34}, {&(0x7f0000001240)="5e3749c561e673dd1d536368e5327a8448c73e585e1bd786fbd7ebabcbfef956a14a09c71030f0f3caf482e4373fd0e9fb4e07758314a1c7c4ae", 0x3a}], 0x5, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x358}}, {{&(0x7f0000001680)=@l2={0x1f, 0xfff8, {0x3f, 0x60, 0x4, 0x4e, 0x52, 0x2}, 0x7fff, 0x7}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001700)="859127c5847301bcfc241c7f4a61c41064ca9118a0b225d3b854df67b5c1f058c6005d355024170c44c036620f7ce32c0c1845c568e36e3c83c85974d793b95549e62b2e30", 0x45}, {&(0x7f0000001780)="77cf6b7c681634f0f36944047dacb04d76d77859211ebe166ea81004ac9d759dc78392632acad6095f1d174ac7b0e0f6c35f5578e4f65fc821dc361b23eaa34a7dc2160596ba3a349806b8cde59da484c4fd7d05df60eca239e6", 0x5a}], 0x2, &(0x7f0000001840)=[{0x1010, 0x0, 0x7fffffff, "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"}], 0x1010}}, {{&(0x7f0000002880)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002900)="a0768edaafc25d646a5c9ca1171bc645893bd52ed6935aea56336019b3b8aedb1a3e48dab8d21806ae24d1ca4a7a8322f18584c75f924e4e9f450017c52f48db6f0d535339ea85946ab233e5d6ce3199e6ce968f45232586bf20161b6754c8f1cd00543026c4db2432065106980edf1d54f19c63749c95acb72e03c0a87ea826c28bfcbf4cbd707e0c6417d97184359c0c5aef9898244d7801417069cf4ac2dc415f7fdab8a303f3f5110a22a2970185c7a17af04d7ec7110bb95425d7ddf27a7c31a35c4cae0c23225b341601d882a2655d50ef44fcd0be0c6f8e770d7b355ec4bb0cbd9115fa2d", 0xe8}, {&(0x7f0000002a00)="ca722f21ddbada5cb90febb0adc740da68d200f25c21e4c44ebf45a9f840667d79042708d925ea4104ae08cfce315306ab0f3ed40d66f0eb0f835d9dfe", 0x3d}, {&(0x7f0000002a40)="029d4aedc038b0f5353bc996a8c1edb482cda55434b531c3dea683a5dbf43b095c7764f6e24ee5fa80d22a49d4b8bd9b8b77791af26070639a3db57621ddd218ceadf5d6cbc3955f675edd6ffa3c0fa2e1c1e68f230ed039d38667a17faa12b35be2e2d60c547cdaa4c1fa22079a38f37694edd11f95e8035341759140b59adb8ff221887b580e923b5b0e55aac474c02ac9e269ce648922864782293199155bb0424a423f8ee2ecb44dab410a8149d26761741de010c605a75fc29b2927df61fa6da0df1aacfd437ac60b2c814e0f56b6ac", 0xd2}, {&(0x7f0000002b40)="1d866a249723503465edf7e66b5b8d06e1959afd1c6edb77164c5b787e30b30c3acd79da58a15f2d8134e91a4cbdecc3e4bc436c21604a23b51eb428ed855f3949755921", 0x44}, {&(0x7f0000002bc0)="1eb33fca5ad0c39c4f3a513d04d2f2a589d029598980b94c9759ddbfa942308fb330545eb2a73dbfa42e369e392d98a0cc553eebcb865bd1f0090c70183977e41e1e0edaec5c450880a992979966d5b541c4aa29798b2abd461aa8cf148e468f8cb9cd1ec944c687b8ee2b78497766fb5060ccb543e3bb12567bad3fb900363287b1157b5839a800bebf00ed9722dc2fe05f9cd5032eea7004ca8aa23971bd2a4e6f982343eb96102a3aff5f9dcbad3b9d6b984830452f7d217a2cd7fb1e", 0xbe}], 0x5, &(0x7f00000053c0)=[{0x10a0, 0x7, 0x2, "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"}, {0x10, 0x310, 0x9}, {0xa8, 0x105, 0x4, "2aa8db6045031efa819554bcca87a3cdae0bb5399c938d57a708f9d3800a6682446033b9d4cc95b5d84b7fe82f5ecb673461d74f10bdad16ccdb2f2aaa940e6fc59975ba101b9aff6bd35c1e1af02c5c95e971b4f20beee1c2e56e32be28a4bd19d581affae1695a2013fcc89015ea87c8c68a5765aa4fe853e4c6f7b26c79d95448e99183e1d5e1f297c8d7cd07e315c32f0309d150"}, {0x60, 0x88, 0x1, "c7cfdd5d9937ebb3825e76cc895b63511185287e7125f929f14ac77c15a10703ee5a109406d3647ffcbb6147c7d9888d171aa63a86385a19a03b7b11b72a5a52d0f829746143cd31eebd0bdaab9c9657"}, {0x88, 0x119, 0x65, "d77430a9f9f1ce1b9b07bf4e39434d94f09ccea6f84bb0da2b60795151028456bf04c8010cb3e99fc3eb84f01376c4aa9e5d36283ad41b98e28a6c4bf5abc7ad09f3d0cd07e03ed27490783d7a53db90e079cdbdb6e11078afe339ca9e5f8cceb00af4324ba51e3db02dab63a24a42561dc9d1"}, {0x68, 0x117, 0x7, "5fa953220c6d0f77bfe98260817d46b998ba710569ca573723bdefcef4f044e8d69fbd9a740b4831f86871f0fb1926b06e69487095c9de41d43d536583286deeaf3b9992f95db71a50bcb2241e6dac3f93c7893e78"}, {0xc8, 0x84, 0x5, "3e688521caba4a2e52ab675f68c0f91770130e9167e08d76fb16dc7b7087e2e70c44f84801720a4d2625a3c6e3b1b193386e56b23a6c59de2f8badfd2047f88bd9528137a0b6cb4bd11b577fc47870eef826eda7099cc3705a648fac8cd6a87db0ceb219c37187eb054e97bdf15271bc479722bfc7e4a450005139bc2d9f58ab5dbef4ef23d251fb2903d0f428af47c18c1cd2eb9703d160009c1f75f1f95f82c06622f46766a3ed7b066e71ec6e4eb718b4818f2c3a"}], 0x1370}}], 0x3, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000080)=0x10000, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000002d00)={0x5, 0x0, [{0x255, 0x0, 0x32}, {0x1fc, 0x0, 0x6}, {0x97d, 0x0, 0x200}, {0x95d, 0x0, 0x2}, {0x11e, 0x0, 0x8}]}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) [ 601.780527][ T9878] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 601.817905][ T9878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:35 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4000, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000180)={0x2, 0xe3, &(0x7f0000000080)="2513fac163665e645e7d73d89ac9cdc83f74c260c3bd844e03247b11cd8825f39a5e78b740207a4fe70e8a1ad022fa83f740b576cb30d026fd92bfd5d9a3ff3f44ce0a48db8d60ad8d9f96013c8a29738e2c2a81c60f151bae896f4c6284ba28d04784d7e6cfe470f1e4bf607e5f162649d4b2e31d6fb171ac8b5d215f4233ddf86fc9eddf8106e65e38286f0a911c0024d0c8bc5182b9256430c0b33c91a69ed2ca60f7901a6c0dbf9009d3f4367c61d689ae56ec982a3ec2e4b6e1f5863c9cc8b8bffd70f543532a730b28f2acad273216bb86873aec6bb34c440e6120d4ec43b63b"}) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvfrom(r2, &(0x7f00000001c0)=""/70, 0x46, 0x62ad20818d3a035c, &(0x7f0000000240)=@llc={0x1a, 0x321, 0x59, 0xf7, 0xe1, 0x7f, @link_local}, 0x80) [ 601.828062][ T9887] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map,acorn'}]}) [ 601.917414][ T9878] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 601.958136][ T9887] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.2'. [ 601.969194][ T9878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016003f0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$vsock_stream(r3, &(0x7f0000000480)={0x28, 0x0, 0x5f93a9e53d88992}, 0x10) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x242101, 0x0) waitid$P_PIDFD(0x3, r8, &(0x7f0000000340), 0x2, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:35 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000040)=0x2, 0x4) [ 602.132353][ T9878] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='mapBacorn'}]}) [ 602.196575][T10011] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 602.228966][T10011] netlink: 59 bytes leftover after parsing attributes in process `syz-executor.2'. [ 602.263481][ T9878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 602.280757][ T9878] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:35 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x1000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r4, 0x2, 0x1, [0x8]}, 0xa) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 602.343012][ T9878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001602400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:35 executing program 4: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r0, 0x10c, 0xe, &(0x7f0000000040)=0x1, 0xfffffffffffffe9b) 03:36:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x2, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:35 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=\"corn'}]}) 03:36:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001603400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 602.716766][T10145] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 602.741038][T10145] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:36 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a80)={&(0x7f0000003240)={0x20, r2, 0x225, 0x0, 0x0, {0x2}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r8 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r7, r8}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r11 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r10, r11}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet6_mreq(r13, 0x29, 0x15, &(0x7f0000000a40)={@mcast2, 0x0}, &(0x7f0000000a80)=0x14) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r17 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r16, r17}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r18 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r18, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r18, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r20 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r19, r20}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001100)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000ac0)={0x5d0, r2, 0x8, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x128, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x4, 0x0, 0x800}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3, 0xd1, 0x5, 0x4}]}}}]}}, {{0x8}, {0x80, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r4}, {0x170, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x168, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x43d}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffb}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3, 0x3f, 0x20, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x98, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7, 0x1, 0x2f, 0x6}, {0x0, 0x7, 0x6, 0xfffff000}, {0x81, 0x3, 0x1}, {0x9, 0x7f, 0x1f, 0x72}, {0x8000, 0x6, 0x1, 0x3}]}}}]}}]}, 0x5d0}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) r21 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r21, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 602.831307][T10145] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 602.833791][ T25] audit: type=1400 audit(2000000196.079:641): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 602.862493][T10145] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001604400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 602.950299][T10145] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 602.961096][T10145] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 602.992163][T10145] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 603.016878][ T25] audit: type=1400 audit(2000000196.089:642): avc: denied { map } for pid=10152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x19, 0x800000000004, 0x4, 0x9}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 603.077075][T10145] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:36 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xde1f6f085bde0ba5, 0x110) sendto$rxrpc(0xffffffffffffffff, &(0x7f0000000080)="b6511845624f2a0565d8247f2f07988be71fc4ba73f872ca4e7de155708cb683c2604819749cb8d03ddcb1f1e954f415a80f0ce75a4314268d0fcb629d11e59b2532b229abc8609ed1e229ee69fb2f1d49262c0de5895d2230505d464556c43fcc2f44925ce2", 0x66, 0x20000841, &(0x7f0000000100)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @rand_addr=0x40000000}}, 0x24) ioctl$NBD_CLEAR_QUE(r1, 0xab05) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000340)={0x6, 0xf845, 0x5, 0x7ff, 0x11, 0x40, 0x0, 0x9, 0xfae, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r6, 0x40405514, &(0x7f00000001c0)={0x0, 0x4, 0x1, 0x1ff, 'syz0\x00', 0x5}) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r9, r8, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=,corn'}]}) [ 603.169681][ T25] audit: type=1400 audit(2000000196.139:643): avc: denied { create } for pid=10155 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001605400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:36 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 603.333708][ T25] audit: type=1400 audit(2000000196.139:644): avc: denied { write } for pid=10155 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:36 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000000)=0x8, 0x2) [ 603.469427][ T25] audit: type=1400 audit(2000000196.149:645): avc: denied { read } for pid=10155 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:36:36 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = accept4(r0, &(0x7f0000000040)=@in6, &(0x7f00000000c0)=0x80, 0x80800) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000)=0x3, 0xffffffffffffffbf) 03:36:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001606400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 603.642396][T10370] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 603.650168][T10370] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 603.668048][ T25] audit: type=1400 audit(2000000196.489:646): avc: denied { map_create } for pid=10272 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:36:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=\\corn'}]}) [ 603.705820][T10370] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200040, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r6, 0x3, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 603.769436][ T25] audit: type=1400 audit(2000000196.489:647): avc: denied { map_read map_write } for pid=10272 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 603.801147][T10370] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 603.873241][T10370] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 603.883527][T10370] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 603.901377][T10370] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 603.909342][T10370] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x19, 0x800000000004, 0x4, 0x9}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:36:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=a\"orn'}]}) 03:36:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001607400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40000, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) [ 604.173526][T10438] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 604.213866][T10438] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 604.242951][T10438] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x100300, 0x0) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000080)={0x100, 0x0, "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"}) 03:36:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=a,orn'}]}) [ 604.303013][T10438] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 604.428742][T10438] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001608400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000100)='net/xfrm_stat\x00') ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000040)="57ebffead6366f4613b48a649f79a9639b", 0x11}) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 604.476554][T10438] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) r6 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_inet_SIOCGIFADDR(r6, 0x8915, &(0x7f0000000040)={'nr0\x00', {0x2, 0x4e24, @local}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 604.516830][T10438] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 604.532444][T10438] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs ', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, [], [{0x7, 0xfffff000, 0x1, 0x8001, 0x3, 0x6}, {0x0, 0x200, 0xfffffffffffffff7, 0x8, 0x1, 0x100}], [[], [], [], []]}) 03:36:37 executing program 4: mkdir(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/28, 0x1c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) 03:36:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=ac\"rn'}]}) 03:36:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001609400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:38 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x115800, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vfio/vfio\x00', 0x104, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netlink(r4, 0x10e, 0x9, &(0x7f0000000400)=""/254, &(0x7f0000000500)=0xfe) bind$llc(r2, &(0x7f0000000040), 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r5, &(0x7f0000000040), 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) dup2(r1, r2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x535}, &(0x7f00000000c0)=0x8) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = inotify_add_watch(r1, &(0x7f00000003c0)='./file0\x00', 0x20) inotify_rm_watch(r8, r9) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r6, 0x1fe}, &(0x7f0000000140)=0x8) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) io_setup(0x1, &(0x7f0000000080)=0x0) io_cancel(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0xed52, 0xffffffffffffffff, &(0x7f00000001c0)="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", 0xfe, 0x3}, &(0x7f0000000300)) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bind$netrom(r12, &(0x7f0000000340)={{0x3, @bcast, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 03:36:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800160a400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r6, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r5, 0x0, 0x156, &(0x7f0000000340)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5', r7}, 0x30) r8 = getpid() syz_open_procfs(r8, &(0x7f0000000100)='net/xfrm_stat\x00') r9 = syz_open_procfs(r8, &(0x7f0000000500)='net\xe6\xcfcmp\x00') r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r10, r9, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r11 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ocfs2_control\x00', 0x620001, 0x0) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r11, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0x296, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, r12, 0xcd30c105371982da, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x200140a1}, 0x40000) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=ac%rn'}]}) [ 605.442044][T10734] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.458131][T10734] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 605.505918][T10734] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.527740][T10734] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800160b400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:38 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x200000002b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200240, 0x0) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x1}) r3 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, 0x0) 03:36:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=ac,rn'}]}) 03:36:38 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000)=0x80000001, 0xfffffcd3) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x48c00, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="04466300", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) [ 605.696796][T10734] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.706134][T10734] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r6, 0x30, 0x1, @in6={0xa, 0x4e22, 0x8, @mcast2, 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$packet(r8, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14, 0x80000) bind$can_j1939(r2, &(0x7f0000000bc0)={0x1d, r9, 0x2, {0x942465beb97b9e59, 0x0, 0x3}, 0xfe}, 0x18) [ 605.762275][T10734] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.806443][T10734] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800160c400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:39 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@remote, @multicast1}, &(0x7f0000000080)=0xc) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:39 executing program 4: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x200000002b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200240, 0x0) pipe(&(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x1}) r3 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, 0x0) 03:36:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 606.199498][T10973] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 606.210132][T10973] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 606.221845][T10973] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=ac\\rn'}]}) 03:36:39 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) connect$netrom(r1, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0xfaf49d3fa9cb7a81, 0x0) pwrite64(r2, &(0x7f0000000140)="a35df7edd5437bec5a824726c98b0a42be82c70fab25fe2592b241415a04abef765c4afa39c0e361bbbdaec0425dc6487b2533fafcfcb8357fac2ebc4fb820fb6d9139a8e5361d8737492bd32f8fda5ebf7fd3fb42c685a3e811ae3d7c0fa90ef054b0b0edc8df73985a9ea4668af60dfe8296da0533dc3b0726954d07452114ca9c4a56297332388cf606562a787db4d4a4baa770671bde5bf85f2378a179c5cd8e053d9ddb5d96ba572d2d8c70a6e22db90da16f8f014ada7a292397ea2b94e7fb403c072c38cc9908297b02a8c590e8fb741223353f116ec335ad", 0xdc, 0x0) [ 606.348813][T10973] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800160e400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 606.437978][ T25] kauditd_printk_skb: 20 callbacks suppressed [ 606.437990][ T25] audit: type=1400 audit(2000000199.679:668): avc: denied { open } for pid=11030 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:39 executing program 5: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 606.514639][T10973] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 606.561300][T10973] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 606.561952][ T25] audit: type=1400 audit(2000000199.689:669): avc: denied { map } for pid=11035 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:39 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=aco\"n'}]}) [ 606.644060][T10973] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 606.652024][T10973] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="fd", 0x1) r2 = add_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000500)="04c273eeccd1a7fd", 0x8, 0x0) keyctl$reject(0x13, r1, 0x5, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f00000001c0)={0x5, 0x6, 0x2, 0x1, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x3}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f00000005c0)={0x1, 0x0, 0x1000, 0x16, &(0x7f0000000540)="853203bb4c21b79d0c2b78c86f20f55bab162f6fde14", 0xffffffc4, 0x0, &(0x7f0000000580)="47cc5baec976a03a75bee2f6c8b2924016a7a6c2c500181833dd751571f8a4e2e0a1478b39b37bf7fea049a99a8e18cd"}) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r8, 0x84, 0x15, &(0x7f0000000800), 0x1) setsockopt$netrom_NETROM_N2(r7, 0x103, 0x3, &(0x7f0000000040)=0x8000, 0xfffffffffffffcd2) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r11 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r12 = getegid() r13 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r13, 0x1, 0x1a, 0x0, 0x0) sendmsg(r13, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r14 = dup(r13) r15 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r15, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r17 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in=@multicast1, 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r16, r17}, {0x6, 0x183, 0x101, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) write$P9_RGETATTR(r14, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x1b04, {0x20, 0x3, 0x8}, 0x58, r17, r12, 0x3, 0x6, 0x6, 0x20, 0x5, 0x6f, 0x3ff, 0xf97d, 0x5, 0x0, 0xc474, 0xfffffffffffffffc, 0x2, 0x0, 0x7}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x200000, &(0x7f0000000a40)=ANY=[@ANYBLOB="747261a032039555733d66012cd4b2", @ANYRESHEX=r9, @ANYBLOB=',wfdno=', @ANYRESHEX=r11, @ANYBLOB=',cache=loose,permit_directio,defcontext=unconfined_u,euid>', @ANYRESDEC=r17, @ANYBLOB="2c736d61636b66736861743d656e63727970746564002c61756469742c006be4105d135b080bd33af779066fdb4dec331f9dd1fc28f6f031149a8a3f9e671464a36704f6e483637a80a63821948ba6e098330c6573a911a9cd56e6c3b3e903f14a83ae2b62d4c2020f8804bc860188d12b9aa0cb2a9aaa1a60fabd9c7592d0b0f3cec241989fcb25aa84bf6be8fd3f10e518b86c69ca1148febfd53f361e7433b7e3b0ade26b4551389feeae156f9451df358e474a699452ba550fbcdf80558773ae19be995508c30d2662df05dd5573eb9dcf57f60bc7761da1a431fbac"]) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000400)={'bridge_slave_1\x00', 0xfffffffc}) write$ppp(r10, &(0x7f0000000380)="596db35db22a9a2aa25c0cff2b88bef233cefd761eb2566efa4cb424248c6019b94a368bae155fe2c788c6892bc171e8403d0d1945083cade676bc805b2db7346dbf0199e7d14eac8a71506b538e497891e0d8607a47f00cc9a999a9cf9d", 0x5e) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800160f400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = shmget(0x0, 0x2000, 0x40, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000040)=""/39) 03:36:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x10', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 606.795924][ T25] audit: type=1400 audit(2000000199.719:670): avc: denied { kernel } for pid=11030 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001610400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 606.904914][T11165] encrypted_key: insufficient parameters specified [ 606.925190][ T25] audit: type=1400 audit(2000000199.749:671): avc: denied { watch } for pid=9767 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:40 executing program 4: pipe(0x0) memfd_create(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) [ 607.007599][T11165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=537 sclass=netlink_route_socket pig=11165 comm=syz-executor.3 03:36:40 executing program 5: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001640)='/dev/nvme-fabrics\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000001680), &(0x7f00000016c0)=0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) [ 607.036504][ T25] audit: type=1400 audit(2000000200.279:672): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:40 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=aco,n'}]}) 03:36:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='rose0\x00') setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ttyprintk\x00', 0x402080, 0x0) ioctl$KDGKBDIACR(r9, 0x4b4a, &(0x7f0000000540)=""/204) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000480)={@empty, @loopback, r10}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) recvmmsg(r6, &(0x7f0000000040), 0x0, 0x2000, &(0x7f0000000340)={0x77359400}) [ 607.297496][ T25] audit: type=1400 audit(2000000200.299:673): avc: denied { map } for pid=11172 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.361323][ T25] audit: type=1400 audit(2000000200.529:674): avc: denied { open } for pid=11180 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001611400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000300)=0xfffffff9, 0x2f2) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r4, 0x1, 0x2, &(0x7f0000000300)=0xfffffff9, 0x2f2) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) [ 607.523307][ T25] audit: type=1400 audit(2000000200.529:675): avc: denied { kernel } for pid=11180 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 03:36:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001612400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6d, &(0x7f0000000480)={r3, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x2d3) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r4, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=aco\\n'}]}) [ 607.754363][T11434] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 607.763706][ T25] audit: type=1400 audit(2000000200.749:676): avc: denied { map } for pid=11316 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 607.840500][T11434] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001613400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:41 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) [ 607.886758][T11434] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 607.900247][ T25] audit: type=1400 audit(2000000200.769:677): avc: denied { watch } for pid=9832 comm="udevd" path="/dev/loop0" dev="devtmpfs" ino=62374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 607.927139][T11434] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:41 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000040)) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acor\"'}]}) [ 608.113796][T11434] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 608.185178][T11434] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 608.212551][T11434] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 608.227254][T11434] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\xf7', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001614400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:41 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) 03:36:41 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acor%'}]}) 03:36:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xcb76a103e934d4eb, &(0x7f0000000040)=[{&(0x7f0000000400)="1400000013000507ed008064d200100005000080", 0x14}], 0x1}, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1) 03:36:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001648400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acor,'}]}) 03:36:42 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r1 = creat(&(0x7f0000001140)='./file0\x00', 0x3) close(r1) execve(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000600)=[&(0x7f00000002c0)='s=-f\x00', &(0x7f0000000380)='mime_type\x00', &(0x7f00000003c0)='/dev/cachefiles\x00', &(0x7f0000000480)='selinux\x00', &(0x7f00000004c0)='cpuset@\xe8\x00', &(0x7f0000000500)='-\x00', &(0x7f0000000540)='/dev/cachefiles\x00', 0x0, &(0x7f00000005c0)='TIPC\x00']) userfaultfd(0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f0000000680)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x9, 0x2, 0xcd8b, 0x7}, 0x10) 03:36:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fsJ', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800164c400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:42 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x2}]}) 03:36:42 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r8, &(0x7f0000000040), 0x10) sendmmsg(r8, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[r4, r8, r0]}, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x401, 0x3, 0x4, 0x81, 0x19, 0x6, 0xf, 0xd4, 0x401, 0x5, 0x2, 0x3f}) 03:36:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x25, &(0x7f0000000000), 0xc) 03:36:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800165a400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001660400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:42 executing program 5: syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'sit0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 03:36:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x22}]}) 03:36:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001668400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:43 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:43 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x628, 0x3}) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:43 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x24}]}) 03:36:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800166c400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='environ\x00') write$P9_RRENAME(r0, &(0x7f0000000140)={0x7, 0x15, 0x2}, 0x7) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = semget(0x2, 0x3, 0x84) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f0000000040)=""/167) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:43 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:43 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001674400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x26}]}) 03:36:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a800167a400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:44 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x8, 0x4, 0xca}, 0x10) 03:36:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:44 executing program 4: ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016fc400008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:44 executing program 4: ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:44 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x28}]}) [ 611.443734][T11681] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 611.469734][T11681] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:44 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}}}, &(0x7f0000000180)=0xe8) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r1, 0x10c, 0x5, &(0x7f0000000040)=0x1, 0x4) [ 611.551380][T11681] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 611.569570][T11681] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600680008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 611.745392][T11681] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 611.771048][T11681] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 611.802847][T11699] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 611.812518][T11699] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600690008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:45 executing program 4: ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) [ 611.861078][T11681] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 611.878104][T11681] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x2a}]}) 03:36:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600a40008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 611.928733][T11706] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 611.944862][T11706] netlink: 101 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 612.109421][T11716] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600020008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:45 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x2e}]}) [ 612.372791][T11726] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600030008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 612.455261][T11729] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 612.465009][T11729] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 612.473944][T11729] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 612.482187][T11729] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) [ 612.514701][T11736] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:46 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x3c78c9b0709b7af7) 03:36:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600040008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x30}]}) 03:36:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:46 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) [ 613.055680][T11759] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.2'. [ 613.087894][T11761] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 613.121375][T11761] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 613.142775][T11761] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 613.171426][T11761] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:46 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600050008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x32}]}) 03:36:46 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x207, 0x9, 0x1, 0x6, 0xff, @remote}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x206300, 0x0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000100)={0x9, 0x9}) [ 613.349765][T11761] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 613.383780][T11761] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 613.435021][T11761] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:46 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600060008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x34}]}) 03:36:46 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$netrom(r3, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) [ 613.573495][T11761] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:46 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:36:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs&', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600070008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600080008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 03:36:47 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000000), 0xfffffe4d) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x5) 03:36:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x36}]}) [ 614.146149][T11830] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.2'. [ 614.155877][T11830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600090008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000a0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000b0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:47 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @initdev}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000140)=0xe8) connect$packet(r2, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x8, 0x6, @link_local}, 0x14) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x38}]}) 03:36:47 executing program 4: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 03:36:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000c0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x3a}]}) 03:36:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x42}]}) 03:36:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000d0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0x5d}]}) [ 614.979599][T11863] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 615.009986][T11863] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 615.042578][T11863] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 615.062346][T11863] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:48 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7, 0x0, 0x0) 03:36:48 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x204080, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r6, r7}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000003ac0)={0x0, 0xdc, &(0x7f0000003a80)={&(0x7f0000003240)={0x20, r4, 0x4, 0x0, 0x0, {0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4004040) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r10 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r9, r10}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001500)=0x14) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r14 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r13, r14}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000001600)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@initdev}}, &(0x7f0000001700)=0xe8) r18 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r18, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r18, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r20 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r19, r20}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r21 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r21, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r21, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r23 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r21, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r22, r23}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r24 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r24, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r24, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r26 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r25, r26}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0}, &(0x7f0000001780)=0x14) r28 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r28, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r30 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r29, r30}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002f40)={0x0, @sco={0x1f, {0x8, 0x6c, 0x81, 0x81, 0x5, 0x6}}, @rc={0x1f, {0x80, 0x7f, 0x8, 0x1, 0x81, 0x59}}, @xdp={0x2c, 0x9, r29, 0x10}, 0x7, 0x0, 0x0, 0x0, 0xff01, &(0x7f0000002f00)='lapb0\x00', 0x1, 0x401, 0x397}) r32 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r32, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r34 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r33, r34}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r35 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r35, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r35, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r37 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r36, r37}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r38 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r38, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r38, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r40 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r39, r40}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r41 = socket$inet6_tcp(0xa, 0x1, 0x0) r42 = fcntl$dupfd(r41, 0x0, r41) ioctl$PERF_EVENT_IOC_ENABLE(r42, 0x8912, 0x400200) accept4$packet(r42, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003000)=0x14, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003080)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000003180)=0xe8) r45 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r45, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r45, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r47 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r45, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r46, r47}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) r48 = socket$inet6_tcp(0xa, 0x1, 0x0) r49 = fcntl$dupfd(r48, 0x0, r48) ioctl$PERF_EVENT_IOC_ENABLE(r49, 0x8912, 0x400200) recvmsg$can_bcm(r49, &(0x7f0000006a40)={&(0x7f0000003400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006880)=[{&(0x7f0000003480)=""/4096, 0x1000}, {&(0x7f0000004480)=""/101, 0x65}, {&(0x7f0000004500)=""/50, 0x32}, {&(0x7f0000004540)=""/59, 0x3b}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/4096, 0x1000}, {&(0x7f0000006580)=""/65, 0x41}, {&(0x7f0000006600)=""/83, 0x53}, {&(0x7f0000006680)=""/206, 0xce}, {&(0x7f0000006780)=""/204, 0xcc}], 0xa, &(0x7f0000006940)=""/223, 0xdf}, 0x10040) getpeername$packet(0xffffffffffffffff, &(0x7f0000006ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009000)=0x14) r53 = socket$inet6_tcp(0xa, 0x1, 0x0) r54 = fcntl$dupfd(r53, 0x0, r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) accept$packet(r54, &(0x7f0000009100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009140)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009180)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000009280)=0xe8) r57 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r57, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r57, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r59 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r57, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r58, r59}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000009c40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000009c00)={&(0x7f00000092c0)={0x920, r4, 0x310, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x224, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff0001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x44, 0xba, 0x6, 0x70f}, {0x3bed, 0xb8, 0x4, 0x8}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r22}, {0x40, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r25}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r31}, {0x134, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r39}}}]}}, {{0x8}, {0xac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xa}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r43}, {0xf8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r44}, {0x4}}, {{0x8}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r46}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r50}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r51}, {0x208, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r52}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r55}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf21a}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffff80}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x0, 0x3, 0xb4, 0x1}, {0x9, 0x1, 0x2, 0xf2e}, {0x3, 0x2, 0xff, 0x5}, {0x9, 0x0, 0x6, 0x1}, {0x5, 0x4, 0x6, 0x7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r56}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r58}}}]}}]}, 0x920}, 0x1, 0x0, 0x0, 0x8040044}, 0x10000450) r60 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$TIPC_NODE_RECVQ_DEPTH(r60, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) r61 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r61, &(0x7f0000000040), 0x10) sendmmsg(r61, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$llc_int(r61, 0x10c, 0x2, &(0x7f0000000000), 0x4) [ 615.236838][T11863] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000e0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn', 0xff}]}) [ 615.352115][T11863] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 615.431389][T11863] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 615.461007][T11863] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a80016000f0008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:48 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r2, 0x40184150, &(0x7f0000000940)={0x0, &(0x7f0000000840)="a1795259dfa4a8a9aaaab3066f8ea6920f2d6999f7f1fac25f42259d052a17ad4867dc50124f59893d46ee4f3a80120cd66594ec5213f1183b567e6f5f5d1f88a960b1351b3dc1317b6206ebe9fc5559b0ad777f183f51e69592076a80c381224a5cca6deb6dcec4dea933c99ce66b7cb7d86dcf4fa57cf3fd12c8a73aa0c33969c5e3e89a6ebeb08febfedac02031d9c8342e77a4d6a6ff7fb4cba70f2827f7c9e5d22c8b665965e568a979f4daeb99ca2c8903574473c608fc1a89b15570182bac0ee05fe8a9e9cd2c0a883a8b59a83730e5920e44ca4e3ca1a1978864bc14268e2ac7be7c25ff", 0xe8}) ioctl$SNDCTL_DSP_SETDUPLEX(r4, 0x5016, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="010c0000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000100)={r7, 0x4e, "483317492cb9c5c1779b17a824e827b5389adbcba9943d67ebe11501062eb2fb4cd0403f7d81fb4fd140bbe392fe7bae8ba4876b012c5b8ddf3b014c7d3b03d36f1cd22e97e7a229c95150a35f3e"}, &(0x7f0000000180)=0x56) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r8, 0xee, "005096a6d24dc74970156f37a5e80bdafb32b6a49e54bc3001c2cc3eb4708a584d5c0b05f82331fd54a991061d14cef269595b49916c65a5a2bacc1aeedaebd46cb394f1314415d099ff889d690646e0a98bb265b8e3befc485aa8e11a5ff64374f87055e87a26e1f212a57ddf05cf1f3a1a02e562c28f82def7cce1bc17c44dc050e53b1e89fa6bd51b548a18093a7c15736dfdc53814d58122f1ea0eba11a3dc92203e3da99ab22957bd639864c0badb1a74516b3464f7ca0b3fc53e154e443f818363800fa19fc69b19cd4af0cde4390a98d6d6783afcd9983aa89f42eaa51ef9cf9fa736c475bdfb657f78cb"}, &(0x7f00000002c0)=0xf6) sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000300)=@generic={0xa, "eddac82b8b36dd231d46fb6bb628b594dd9669d5eaf433e3ef78279b665b0cb3c25e707a432f73558cac087fea98b07f9da63e582e1bc41ba719b73fae07a29135c5b32301969e9d8798a7a35dddf98b93898365f4978d780ef3408c5646802ad3e294a313a697128fcb3007a8809e48764b1a4f7c0984940bc1ed8fccb2"}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)="cdbb9b2a27c3", 0x6}, {&(0x7f00000003c0)="4f4df44630a241b4f519816afe8e39165fa7aa726e80a232d650db75389350747db50facb47c711a73e28aba03426e14e1a44b182872923a0becd17f054173c09c2b8cfd37a97f26a85ad17504d8a2d583652d96d6e3430894b7d482a1f4416388811ccb078d8f79674cd77bb2302e3c186567b3483550f451ff5b83197814f570f74f9b5fa312630657df72618531dc80b72fe447d9e33a162a71b4df3e49675649ed0a2f71e91402ae319fb11a8c44803716eb8270155a2a5db3acbdd1e3098f5266e01ba5c7a224522c", 0xcb}, {&(0x7f00000004c0)="60f013724d31317c955e61264e321663b0718e1812bedf446decf16fb19d0bb2fd2d5c5212a4658a1a0cb9d565ce2577269332877fccdf9596db396f301b59086135644fd591af37e9225d80cbe722e24c365fb9508c8dcd76e5a6cec0315eb2b93166905b8d8cb94b91558ee5701dc5d2f0f2d9702dd53f36e0fa5cd10c9e8f3bdf95b880161540e3fb3b1cc8cf3a3ced7757a65618a590f4e6e526d712bf4b8ff48ddf3f80636b4e495582c029e7e794260724a42cf25e849434d383bf03291ab4bb0b111ce54f70f79c10efb649d9c02eb519f2", 0xd5}, {&(0x7f00000005c0)="c388580ff9115c1603bf2551af6d82fb83de6c6b2a1954ef8c9351c5d5fdf344aacb8af5b16a49182a3134428a54bae3d053d902754a8b6c401619c9072bc89b528053940a3dab3dfe16cc9accd51d50beb11c64c53e491332e7c60cd1af4ba4e349277ef00ce7dcb7d59ad518b59192b99771d70db7b400abbf125edb691b339dddb9ebf9dadb636ea3", 0x8a}], 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x110}}], 0x1, 0x0) r9 = accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x10, 0x80800) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6) setsockopt$llc_int(r9, 0x10c, 0x6, &(0x7f0000000000), 0x172) 03:36:48 executing program 4: 03:36:48 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000040)=""/4096) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) 03:36:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0x8}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x100000009) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$DRM_IOCTL_SG_ALLOC(r13, 0xc0106438, &(0x7f0000000340)={0x6, r8}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:49 executing program 4: 03:36:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}]}) 03:36:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) waitid(0x6, 0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f00000000c0)) bind$llc(0xffffffffffffffff, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) read(r0, &(0x7f0000000200)=""/171, 0xab) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfff}}, 0x0, 0x9, 0x0, "c67fcc5a4ccd9da00c2a8891b93969ded4c27b3caf9a6d67faf930a55546c351a3ee994e5bb40b2ff1939cd666f8aafe32332d5ba49646a23c88e7525a26922ef8e03fc6370cbe6376a906b6d74423ea"}, 0xd8) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x400, 0x4) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000080)=0x4, 0x4) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f00000001c0)={0x1, 0x1}, 0x2) 03:36:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600100008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 615.859479][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 615.859493][ T25] audit: type=1400 audit(2000000209.099:683): avc: denied { watch } for pid=9767 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=582 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600110008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:49 executing program 4: [ 616.098706][ T25] audit: type=1400 audit(2000000209.109:684): avc: denied { map } for pid=11928 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40080, 0x0) setsockopt$llc_int(r1, 0x10c, 0x4, &(0x7f0000000000)=0x3, 0x4) flistxattr(r0, &(0x7f0000000040)=""/209, 0xd1) 03:36:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PPPIOCSNPMODE(r7, 0x4008744b, &(0x7f0000000040)={0x2d}) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600120008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:49 executing program 4: 03:36:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5a5e4e9193fe119c, &(0x7f0000000100)=0xfffffffd, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000a80)={0xc5b, 0x80, 0x800}) r3 = getegid() r4 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) sendmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) r8 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000060c0)={{{@in=@remote, @in6=@rand_addr="20bbcbd1865253e3e58aa219d6ca6440", 0x4e24, 0x2400000000000000, 0x4e1f, 0x0, 0x2, 0x80, 0x0, 0x67, r7, r8}, {0x6, 0x183, 0x3, 0x7f, 0x61553a0b, 0x6, 0x1, 0x4}, {0x20, 0x80000001, 0x2000000000000, 0x9}, 0x9, 0x6e6bba, 0x0, 0x1, 0x1, 0x3}, {{@in=@empty, 0x4d3, 0xff}, 0xa, @in=@loopback, 0x3504, 0x0, 0x3, 0xfffffffffffffffc, 0x1fb, 0x5, 0x6}}, 0xe8) write$P9_RGETATTR(r5, &(0x7f00000003c0)={0xa0, 0x19, 0x2, {0x1b04, {0x20, 0x3, 0x8}, 0x58, r8, r3, 0x3, 0x6, 0x6, 0x20, 0x5, 0x6f, 0x3ff, 0xf97d, 0x5, 0x0, 0xc474, 0xfffffffffffffffc, 0x2, 0x0, 0x7}}, 0xa0) syz_mount_image$ext4(&(0x7f0000000800)='ext4\x00', &(0x7f0000000840)='./file0\x00', 0x5, 0x1, &(0x7f00000008c0)=[{&(0x7f0000000880)="2437dbbb2233e2917136c3f8c31c9c06e3abd2731826ecdd4b46515f4593b0461339452025be3a132eb48c7ef6d4561e773849dde19f81dfbef3730e2e7b", 0x3e, 0x4}], 0x20, &(0x7f0000000900)={[{@noquota='noquota'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@data_err_ignore='data_err=ignore'}], [{@uid_eq={'uid', 0x3d, r8}}]}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x7, &(0x7f0000000600)=[{&(0x7f0000000140)="9ac4951602e5ab52ff2d4f659586eeb0f5a115493096667705016302fc7570999ec2fe3e94efcb48ddf6274b24e023c560b0432d274a928ab603d7bb3ca11163e531241ee1c06307f60b97b0dceef8f2fe31e7bb9e9cede5f5a5544e93ff2f19c7dde7a13a081eea344eb3e425bfb6b5bd0f6adadcaf56eacb6985dae5545e32012339a9b03e6efb7847e40628ff94bdd417c99775b2b5650c095d20ae4a43aa6342d813a7ce846ef0abaf62a371735cb5ea703ece87b0d3d8b74ffce3cbc9f8967408866bf10c11", 0xc8, 0x1b2dee46}, {&(0x7f0000000240)="5113623b07873bd39efcf1520a1cb38b68ac520f2443ffa0dd551e52424fbe49791a4c366573eafde1b8ee4b21b5f9b0d47d8d96f6ce5264f1af3be646321f1ad4d3090c4e5c916c1f22376a0276e5fb31d7102ce27d6c814fab9083286a37ae610af34ea8a1e67522b32d8f2692539edb0e4537fb89529563553cc52e2464ed942546f4e24420724e6394ea973d28747cee6f476ec673da5b5a9d6b11220974abf4b282705ac53b621a5d0afa19dfec16c54f1a263c24d1e725fd5f28aaa5608a8cb0d4af0a920e64d3834b615b7524f41f076befcfea", 0xd7, 0x3}, {&(0x7f0000000080)="ca3dd1434c24ca32424f9efbf1cc2767e5dc03daa5eea97e", 0x18, 0x8}, {&(0x7f0000000340)="3e38b1906ebd4c33a43de66daef9419376b08b8158ca397f2a71164d2e19d61fdf5a7ef6469b239e08b56a2bb9393d07c7de992c222b77443ee5229a971106a0da3cf599907873a1c45fb3ed914b8997bfbc8eb2b0fb43ace89ee7afd4f2ea7d", 0x60, 0x2}, {&(0x7f00000003c0)="6d8613abe1ad3d4b7606fd04f9fb3c6237c196458e1547c1be1849188a3dc678cc6f92d33424eb0560f2b97bf079d199f410948508d45244df395371a41354e64d702976d7d1cb3609d32048099abffb6067811060433d236baa5d0d146157d9d12913e00e8836614459cec4424aefb8cabba143ea52cb754a924230c3900ded61952439711fcb03c1bb006b77da62375818e527755eb2a78a37", 0x9a, 0x6071}, {&(0x7f0000000480)="d78771718477e262cfdcb9c47a88440e6c42b715aa3f4701340d3046888792c59772c43962b76d25c4ca0a144ab8170d9d2c95f2f2381c68b4d3fe50fb8de10665600a9d14e2c3608b9c89828f51cee7f71702d6ab970ea214eb02cae8bc3de3a026fd0631a5e4f4b4cf8cde6c27f10000ff7f9b3550761e4632a1d621be78fd7d616876b7c81e9618d4bc471fd484826f0b3238800d8e4ef98520f5857cb4a83f3e54bbc5348448b53f3663b9f279226754f3a140828252fde9689c47dca3c48dd363b5bf49381b5a98536223bf77", 0xcf, 0xfffffffffffffffe}, {&(0x7f0000000580)="ea883fd2fceb2eefa67e3c62b37206be1f32d87cb3d56f80940e8adc25ca30ab602a5dd3911e544841d369acc06a24e88507ce57ccdee5ead7cc36af1b17e5026e13a38cc45789ed1791b7a4128ace346708a0fc003066a72daf9150dc04a088b172", 0x62, 0x3}], 0x10, &(0x7f00000006c0)=ANY=[@ANYBLOB="646d61737b3d30303030300836220c30303030303030303031fbffffffffffffff736b3d30303030303030303030303030303030303137373737372c636173655f73656e7369746976653d7965732c757466382c73686f775f7379735f66696c65733d6e6f2c00"]) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000740)={0x2, 'gretap0\x00', {0x2}, 0xfeaa}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1c, &(0x7f00000007c0)={0x2, &(0x7f00000000c0)=[{0x1, 0x1, 0xb6}, {0x4, 0x3, 0xff, 0x3}]}) ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000000a40)) [ 616.391084][T12041] ISOFS: Unable to identify CD-ROM format. [ 616.435909][T12074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=537 sclass=netlink_route_socket pig=12074 comm=syz-executor.5 [ 616.450724][ T25] audit: type=1400 audit(2000000209.699:685): avc: denied { map } for pid=12075 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600130008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 616.477116][ T25] audit: type=1400 audit(2000000209.699:686): avc: denied { watch } for pid=13011 comm="udevd" path="/dev/loop4" dev="devtmpfs" ino=585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 03:36:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x2}) 03:36:49 executing program 4: 03:36:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) syz_init_net_socket$x25(0x9, 0x5, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:49 executing program 4: 03:36:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 616.655491][T12183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=537 sclass=netlink_route_socket pig=12183 comm=syz-executor.5 [ 616.807345][T12112] ntfs: (device loop5): parse_options(): Unrecognized mount option dmas{. 03:36:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600140008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:50 executing program 4: [ 616.847319][ T25] audit: type=1400 audit(2000000210.089:687): avc: denied { map } for pid=12197 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 616.853772][T12112] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 616.890905][T12112] ntfs: (device loop5): parse_options(): Unrecognized mount option . 03:36:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x3}) [ 617.004616][ T25] audit: type=1400 audit(2000000210.249:688): avc: denied { watch } for pid=13011 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 [ 617.040059][T12255] __nla_validate_parse: 16 callbacks suppressed [ 617.040069][T12255] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:50 executing program 4: [ 617.077584][T12255] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:50 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f0000000040), 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x748402, 0x0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000180)={0x6, {0x9, 0x4, 0x6, 0x49f}}) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) connect$llc(r1, &(0x7f0000000040)={0x1a, 0x320, 0x6, 0x9, 0x15, 0x8, @random="caf31c2aa74c"}, 0x10) 03:36:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600150008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x4}) 03:36:50 executing program 4: 03:36:50 executing program 4: 03:36:50 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = getpid() syz_open_procfs(r4, &(0x7f0000000100)='net/xfrm_stat\x00') r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000340)='{\xde\x97\'\xa0\xb3\xefbp+=\xda\xdf\xb6\xe5\xd5\x0e\"\xbc\xa6a\xed\x98tm\x00') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x301001, 0x0) write$uinput_user_dev(r8, &(0x7f0000000500)={'syz0\x00', {0x401, 0x5, 0x8, 0xb2}, 0x16, [0x3, 0x80, 0xa1, 0x0, 0x400, 0x6, 0x0, 0xc000000, 0x7, 0x401, 0x9, 0x5, 0x8, 0x8, 0x7ff, 0x3, 0x2, 0x0, 0x1ff, 0xffffffff, 0x7, 0x9f, 0x8000, 0x0, 0xfffffff9, 0xfffffffc, 0x2, 0xffff, 0x7, 0x7, 0x1ff, 0x5, 0x0, 0x0, 0xff, 0xe000, 0x7, 0xfffffffe, 0x9, 0x3, 0xffffffff, 0x1000, 0x1, 0x3, 0x0, 0x1, 0xa82, 0xd15, 0x1e, 0x1, 0x80000000, 0x3, 0x1, 0x3, 0x8, 0x3, 0xea, 0x2, 0x5, 0x10001, 0x80000001, 0x4, 0x4, 0xc3], [0x7f, 0x800, 0x1, 0x7, 0x10001, 0x40, 0x8, 0x0, 0x1000, 0x0, 0x8, 0x0, 0xffff17b1, 0x0, 0xfff, 0x4, 0x13d, 0x3, 0x5, 0x8, 0x4, 0x0, 0x3ff, 0x31, 0x49, 0x70, 0x5, 0xfffffffa, 0x2, 0x8000, 0x6, 0x10001, 0x4, 0x3f, 0x2, 0x1, 0x3, 0x9, 0x8, 0x7, 0x80000001, 0x7f, 0x7bb, 0x500000, 0x7, 0x0, 0x401, 0x8001, 0x8001, 0x5, 0x1000, 0x8001, 0x1ff, 0x1, 0x3ff, 0x0, 0x8, 0x20, 0x7, 0x7, 0xfffffffe, 0xd8, 0x100, 0x1], [0x0, 0xc, 0x7fffffff, 0x2, 0x9, 0x6, 0xf6, 0x5772, 0x6, 0x5, 0x8, 0x5, 0x8fd, 0xca4, 0x8, 0x9, 0x0, 0x4, 0xfffffffe, 0x81, 0x8, 0xf, 0xfff, 0x8000, 0x9, 0x5, 0x3f, 0x7ff, 0xfff, 0x200, 0x8, 0x3, 0x4, 0x81, 0x8, 0x7, 0x6, 0x1, 0x3ff, 0x1, 0x1, 0x0, 0x6, 0x1ff, 0xff, 0x6, 0x40, 0x5, 0x2, 0x9, 0x4, 0x2, 0x6b96, 0x7, 0x8c, 0x6a40, 0x9, 0x40, 0x4, 0x2, 0x0, 0x3, 0xfff, 0x5], [0x6, 0x8, 0x5, 0x2, 0x38ab, 0x6, 0x22b, 0x0, 0x1, 0xd000000, 0x3, 0x9, 0x101, 0xd8b4, 0x1, 0x2, 0x3, 0x5c62, 0x5, 0x200, 0xffffff00, 0x3, 0x8, 0x9, 0xbc2, 0x3, 0x7fffffff, 0x5, 0x6, 0x5, 0xe57f, 0x2, 0x7fff, 0x4, 0x7ff, 0x37, 0x1000, 0x7, 0x80, 0x101, 0xf6, 0x7, 0xff, 0x4bcc, 0x101, 0x4, 0x1, 0xfff, 0x1, 0x9, 0x401, 0x9, 0x8, 0x6, 0xe397, 0x6, 0x8a7, 0x287c, 0x9, 0x46c3, 0x3, 0x5, 0x5, 0x1f]}, 0x45c) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000000280)=0xfffffffe, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 617.418213][T12330] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 617.475044][T12345] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. [ 617.500235][T12330] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:50 executing program 4: [ 617.544555][T12345] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. [ 617.565823][T12330] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 617.573764][T12330] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600160008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x5}) 03:36:51 executing program 4: 03:36:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @local, 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 617.785013][T12466] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. [ 617.811021][T12466] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:51 executing program 4: 03:36:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600170008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x6}) 03:36:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) r6 = accept4$rose(r5, &(0x7f0000000040)=@full={0xb, @dev, @bcast, 0x0, [@remote, @bcast, @bcast, @rose, @default, @bcast]}, &(0x7f0000000340)=0x40, 0x80000) ioctl$FS_IOC_GETFLAGS(r6, 0x80086601, &(0x7f0000000380)) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:51 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000100)=[{0x1, 0x0, 0x1000}], 0x1) semtimedop(r0, &(0x7f0000000040)=[{0x1, 0x9, 0x1000}, {0x3, 0x101, 0x800}, {0x3, 0x0, 0x1000}, {0x2, 0x4, 0x1000}, {0x4, 0x2, 0x1800}], 0x5, &(0x7f0000000080)) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) write$capi20_data(r2, &(0x7f0000000140)={{0x10, 0x5, 0x675ab429a5b76983, 0x80, 0x9, 0x3}, 0x1000, "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"}, 0x1012) sync() setsockopt$llc_int(r1, 0x10c, 0xf69652cbe55f39f7, &(0x7f0000000000)=0x8, 0x4) [ 618.315940][T12600] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:51 executing program 4: [ 618.361265][T12600] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600180008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 618.470101][ T25] audit: type=1400 audit(2000000211.709:689): avc: denied { map } for pid=12611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:36:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x7}) 03:36:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0xffffffff, 0x1, 0x20, 0xfff, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000340)=@sco={0x1f, {0xbf, 0x4, 0xcb, 0x80, 0x2, 0x1}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="8c88ae6d4417e323aa8a3d329b6c8e1bf778ff838a38e33e6af72312ffd86c92441478f588532e5df25493eb516ae817efca84c22145ba93c72a154d32f53599fcc264e3a30fbca9153894fd662ec03e93bc32594ec6764f3ea47dabfcb383277fb08180b2b9dce03689c1c3dac6738bd51a9fcbe31bd89441c9dc6f2d0eadd4590d635d29649783e236fc2fb4c87e723f686309406210cbf2b797ae", 0x9c}, {&(0x7f0000000500)="23f0f3c753424286bba563f0e6639d54a5ed0c7ca835af693951d99af9cd28de8fcbf18e4660778f4c8b232de29a124f2b3f95d9965bc7f09051914c6b823b78f97a1fb273bc394f4bfa7f4eae8bbe5d0570b94b05f5b4077dc9f9789511f7fdfc77924544e02b26e36b1ecb33ed603fe74c9f23c9ecd4a9585f359b0d9cc5243759524927f656aa42024c1bf259eb743e4d27fe21e9c2410649d78f662571de82046a05257507e42c9de69d76d56f859adac3d9fbd7f5a7a187", 0xba}, {&(0x7f0000000040)="2f7fd143d82150ce5ebf702a2b3b3e530f2609a5b805fa7b29d724a95a0381509989be7599d1606f2cce5818fcf40a57fbdc2c350d077b5c45f5a8", 0x3b}], 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x400}, 0x90806) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) [ 618.619010][T12720] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:51 executing program 4: [ 618.708179][T12720] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600190008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:52 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x52901, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000000), 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0xaaaaaaaaaaaac37}) 03:36:52 executing program 5: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x800, 0x100) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x280000, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) shutdown(r1, 0x1) 03:36:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x8}) 03:36:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600680008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:52 executing program 4: 03:36:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:52 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/p2oc/self\x00', 0x2000, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000400)=0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x81, 0xb4, 0x42, 0x0, 0xfffffffffffffff8, 0x49010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x8408, 0xfffffffffffffffa, 0x1, 0x0, 0xff, 0x80, 0x4}, r6, 0x10, r8, 0x8) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600690008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:52 executing program 5: syz_init_net_socket$llc(0x1a, 0x2, 0x0) 03:36:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0x9}) 03:36:52 executing program 4: 03:36:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) sendmmsg(r1, &(0x7f00000007c0), 0x0, 0x0) signalfd(r1, &(0x7f0000000180)={0x200}, 0x8) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x409000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x100000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x8, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000040), 0xffffffa3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x208081, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000380)=[@timestamp, @sack_perm], 0x2) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x400, 0x0) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000700)={0x4, 0x0, [{0x1000, 0x7c, &(0x7f0000000400)=""/124}, {0x6000, 0xa0, &(0x7f0000000480)=""/160}, {0x6000, 0xff, &(0x7f0000000540)=""/255}, {0x10000, 0xb0, &(0x7f0000000640)=""/176}]}) sysfs$1(0x1, &(0x7f0000000080)='/dev/vcs#\x00') r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x101000, 0x0) ioctl$UI_GET_VERSION(r6, 0x8004552d, &(0x7f0000000140)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) sendmsg$can_raw(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)=@can={{0x3, 0x0, 0x1}, 0x7, 0x1, 0x0, 0x0, "bcee163b873af5ca"}, 0x10}, 0x1, 0x0, 0x0, 0x6}, 0x44080) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) 03:36:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:52 executing program 3: r0 = semget(0x1, 0x3, 0x200) semctl$IPC_RMID(r0, 0x0, 0x0) getegid() semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000003c0)=""/148) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x202000, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000500)=0x2, 0x4) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000380)=r8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600a40008c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0xa}) 03:36:53 executing program 4: 03:36:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom$ax25(r1, &(0x7f0000000040)=""/4096, 0x1000, 0x40002142, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001180)={r4, &(0x7f0000001040)="3eb950c63f9cc4b190ec176ba57097205bee502696bc5e72f2f760dcd79e9c606e3df2353aae0f37e22ad0f8b898bcde48eca47a139eb2190fb8d0a10dac1d54009704bd438c71a8fa28af030478b2578dae1cbfd84c683dc88f1976f1999138ba2947ad9f606aa5c0355db2ead68f3ab663eed4bd9b04be07dbfb24f25f238e40f9a003e1e183b836f691d18ba9ac1229fb594d8c08549e", &(0x7f0000001100)="d5c4bb62cdf6a0597b99f65c208bc80b877fa3f3970d4f944afe878e10b61215deb774a7213460706170bba1c8e3a0535b8928813fa3d985d72fd2aedea358f85ac8a6012a766460b222cc7bd8630d81a30266c614e56f8c7ea0130de21831e86393fbc7a1096b18e6ebabe9d150d99cb539802cbec9231c01639631a072d4", 0x3}, 0x20) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r5, 0x10c, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f00000011c0)={r2, 0xffff}) 03:36:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600401000c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:53 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/96}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89fa, &(0x7f0000000140)='sit0\x00') 03:36:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0xb}) 03:36:53 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2}, 0xe) 03:36:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x04', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600400003c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:36:53 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x3, 0x62b}) 03:36:53 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, 0x0) 03:36:53 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xe2f098af0223af0c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000200000002) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0x7}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000340)=""/187, &(0x7f0000000040)=0xbb) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\xa31\xb24\xa9BNo\x19\xc3\xe6>RL\"\xc5f+o\x86\xb9M\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&$\xe0\xfc\r\x13yg\xefX\xfbk\xbb\x15\xea\xa4\xfe\ru\xed=~\xb2m\x1e\xcd\xb1e\xba?\xde\x1b9\x9d9(\xfc\xb1+\xc0\xd9\x97\xd8\xdf\x02\xb7\x95\xf2\x19=c\x13\xc2D\xe35\xd4\xbe-\x91\xb0M\x12ib\xc6\xda!\xd3t\x96|\x7f\x19\xb7\xfe\x87u\xe1\x85\xe6\xcb\x0f\xff\xc2;\xbc|+\x89\xa6/\x04A\x91\xeene\x10\xe4\xa2\x00\xf4mr\xc8\xe7\xd4R\xb5\xf8\x1a\x8d\x1c}\xabI\xa3\xde\x96\xb8%Sf\xae!q\x133\x8b\x9d<\"\xb8n\xb2\xbf\x1d\xdb\x9f\x12O/a\x90>\xc6\xd81O\xae\x00[\xbdU\xbe($\xfb\xff\xe3f\xdb\xd4\xab\x8e\xcfu\xf5\x89\xfc\x97\x82\xb7\xa9f\x7f\xbd\bINz\x86\xael.\xa7\xcb\f\xfa\xc3\xcax>\xf4\x10\xbf\xb9\xe1\xf8\xebI[F\xd5\xa4\x85l\xc2\xcfn\b\x00\x00\x00\x00\x00\x00\x00y;W\xed$\xdb\xd8J\x8b\xc5') r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r7, &(0x7f0000000040), 0x10) sendmmsg(r7, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) write$binfmt_elf64(r7, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x7b, 0x9, 0xe2, 0x1, 0x3, 0x3, 0x3, 0x5, 0x3d, 0x40, 0x18, 0x6, 0x3, 0x38, 0x1, 0x0, 0x2, 0x4}, [{0x6474e551, 0x1, 0x1, 0x400, 0x8, 0x8000, 0x8, 0x4a4d}, {0x0, 0xfffff7bf, 0x1ff, 0x2, 0x3, 0x6, 0xd046, 0x2}], "1e6d9191006845ebcdb82dd23b136fa313e98fa6149355ec4e81e567ad842bb911de6b317b08a2441c4b77ed45c3c899293b151529bffa8092f9aeb0306a888e1dd70c2035c4c0b2e9b391f315794d1c9106", [[], []]}, 0x302) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r8, r6, 0x0, 0x100000000000002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000200)={0x6, 0x0, {0xffffffffffffffff, 0x0, 0xfff, 0x475bfd2245752797}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e02, 0x0, @rand_addr="475ba57f2800d3d31b30a91f8174ad38", 0x8000}}}, 0xa0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xd4, {}, 0x0, 0x2}, 0xe) 03:36:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}], [], 0xc}) 03:36:53 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2, 0x0) writev(r1, &(0x7f0000002400)=[{&(0x7f00000000c0)="86e86ab94aa66905f2f0eb3e83e506c938e3d7339aa0820ebdd81b90a048601147adecbef092c08bc826e42963367045dc8a4783894430fc77400fa1bdfadd1b685216c818bd0bab6397ef9f90bdda339326d95fdf81d45ae2d8f6a545f8d5e4b3d27f3c09a082eb3e4465c4abdacc9a72f0ca7ed7eedd73d21bba1cb6a5a4ad99cbe1c21987a8d5771193a167b3defe6b5417cdc468904428fd51ca6cc855fafd301b4fafc25d4977bfdef58674919666afa6ec0f843de3f9", 0xb9}, {&(0x7f0000000180)}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="408f5a4a1a00c5a89f90b553f783c9", 0xf}, {&(0x7f0000000240)="f65aa7749b27d49d520c8c94033a637cf15d7f65cc26f055ff7b2eef6d6051a636266ec86a193fbe6a0354bd912c43e587edb3a05de9dd6bfdf8e79edc142963594d874b89ab27e2d05571af754b0cd28ce72c8a625c2b5b10750c1b7314a48c176b2bb7e7e8b2ad34ebb6143873979717d443b88b87f721b79bb152c28a8777387a2dc64c2b7b90f3eb4702b4d3c9b2e5b6", 0x92}, {&(0x7f0000000300)="c07b4f9da0c17be6de48e39dbbc24e6616a773464edd326186d6390a558ef181b533eb0419389f743ad44dda007353be49626d3e1cec5e2a291e3beac5cc2676c86f2685415ea934d23fd0afe0d22adc99a82c0b214f413d55ea8235a5227f95237454813f6dadc8497081fae324144cb4b6fb63158bb35cde8c86e49ebef3357a7c314ddc729b556498ff437e75cc51c94c8810f7457d271c7da0a96b108833b7620a14d2c085b433e213ede900413035ce8f55d3a4ab81d707c5c842770724fd4e306aeca654854320aa79a64c16b328423098665034b3ef021e5a806c9f3670f603171beca8a0ba0baf8c1c2d6e8e1a88ca16f654383a2d43d11ea27f1fb7386afe76f9b57fe58c06645367c46e7f24511c97feb10829d29d38755e468a754b3f0aaab693b9bda909607e3b5205329056f1e6e234a1f18b03ed0ae5abd6eaaee8f22b184f80850488fdbdbe1faeff6d6eb51e5b26127bb30f497031cb106e425d5307d8bcc23108d4c1701319f59a50402bfa25ed0679aa0b8909a3b99c26df561daf4213f60774ab50ef74e3e7f08744e9f9a3d76fcb71b348c1a0c7ed8b30bfd3fda28eab2dcd098c25e74e0ada812e7bcc23d33995f4c33d5e08e9c6ead0c584e34c566dc3666afe206fb6132ff89ba03cf681aa8fe9bf1208f90b183da47d42acc756be9504953844c948d6b8762e60076cd97dd4e4a0929d3fbc8a586c8585c3fe94314c64909d1ea6ed08cbdf1a3a53e8a82acbf25f934c80f226cbab7f6191a41a251cce5eb4a4a1152e7227f973f560cacb2c54402134c1f3dd8d29b20e8c9734f72b78033c6737acf702653fdcde721a04544fb66db36e65286f7bbc0c55dfd70cf0c497ac043280322715b5a3a1e50b1e490842df17fe049aaace3b454433c461404df7e68a7cf678e5894d95399ca13e2026b09615bb9b5aaf60adca2b584d0b410b41632894cba386345dcbf54de3cc0117503e324766e42d4fd6afbb39d19c830676be20831d357ba0cc29996effb34b4fed4e9dde62ec8dac29e97daf92d70f28e803907dc55de28a2c8e3af2457eda13a53ea355527c8d1a804333c7f28db1b7f78d7b9e81edbf27fcdb5967a91608542a58df96ad120619108427fa3c2e6eeb9dd8399896a54f0edc18c8e2d9cd141fecb93510404b9e692b108fe2096b863804cc3d613082f816f4c804e1cf6f246f4a21dee65764306c64b5d593f2ff905ab30ad578dde44cc097530a07e801de8dfd0d0a4bbdf67d66205f59359ec8c75269c01a6a04362b01bf222779d5b6ed433b01cc3553e126cd7b78ae891d2642a9236d54346a9ac71e15cc26516bc9bf5154b295f4a439e5e48764a3b20f15d4d5d8c0514b3d00346e7ad1d5a83f4a478f907f61da1f4315d2be7b6bac650727f79fdcc380c65274d295238c551e5d48c370aaa3576b518ea15d2a30c99e724be39fcb25f25f2cfebc964c670701878275f4569664646bbd85abdf28b0d56d7d73524ac896a9dc0aa1ba4c7aa9a5cc172efda5d145b0d449cd5089df1ea06ed2aa5731827de6f9c2ccc9327d685fdd4f27cba20cf9ec88ee7e9cb7c699121cd3b50c69c7ccef22434aa7b79d7ebebdf2efeeff8bc79fa890cc2229f7252c05d03d42a1ae1f792f1d77da16c02401cb1d07739d820e489160dd0f4cba5c70002ff07fa239792d554765aa59eac88d7175f917d7dbba5cd916842a6bacfd5d5b8d57fd59e51626cc4f9b88294aafd0581d17b4f0be55e6e7cf6fb3bf049a097f983e751afc585204cd6267f8170cea862ed88db5975edb76b3229cc07bda6060698a26993e6efbf285eb6c527814959f899c22d1138cd68d7cd56c518638a3848df83315d9b39ae00c8aae444e286321bc6ac1ef292a833788348a37fc0c80b4f400318e2297a3935e765b8b7b249c7b8178e9fb87d4f97414420ffdfa6ff6119547b547408de7acafea59f51f70af1b71fe0eecff75dff53c54cfceb2daac2ca88fc82797216deeb66ce4ea0bd0f34124bdf677b1ee6b1798498869f8c98f870422d3b1ffb29040a754a6142d89cb956f79115e8991dd5dc1ab1b7feddcc81dcb2904ec50b99fa99aadd8357394fe3ce98a6407a4a20ca4326ffae25fe87897ab86d7cf5ac28c11e88e92db39da51f7c3d340424f4f3978d248db158134332d2f5145e2ea02f9a394c8eec211e6a320b1be3dbc8de3a8e1d60d50100487296a75625c731d508c0afbf7a641f9c683eb131e7895eff8f7afb2cb051af1b32f8b195c468470ef7df7091e57178d1a6ac87765aad5e58ee93134bba18c541997e85e21430fede601f830aa8f7605fbf779868a9d4baca4f9a5325bca81a6f5dd2c8ec348d682a952e997f7a0497757a6c35aa6349a6d48f5b6bc07f6c408ac3fc6ec7cee79f598e72de4627b05d258a7dfaecfc4e0abec3b7ebe440c6dae40a69f4a7ce2d92a79b421a86963b9fdab9aba0dba288fb3ef612f75bdd6cf5a9f9acf792c2c12271ed22a1b0d86ba0660b4959e1f245adda254eceff8db4c37a9da80e742767abb7da480de7ca2c6de0ea5a9274629209c47dc0f27be349ac06f423077af1822d2b4aff77c5e379ac0d4e0478129521ac903375c7aafb6abdc03461c29883874ed41fdc4121ac31d27dc395d63a711dee34c65301aa6dfd3f1ee7bd4539dfee843e1806e1ca10e19a0eab9208480f2569bc3747dcd9cfc15afa97f8571ba9f77fe4684052fe19f18a90a169a9650b3710106e0db1e212f9d56f70b9bc38b34573110db542d189271e9a527c13ed577754def0dfc70f3607675c86a3c266417046d9299eb69183a2bdd5e5b179d5868e24f0a6ef07577371593aad74249d5e1c0b120de189c59a7e2a04ee1be8c70a4dd0193356b73a3777f8496e7b9b772d0240d6de2fb40960d08d6033e4afaf9a0000b99db662cfafc90a3a72c71d22b3279d93cf076bdfff4a72fbfac2cbbdbb7bcc4df58e26777419683386c8cce59f8acdd551520ea0c8aef852dfa09ef6aca88c427bacf0ded2f45525a0969afa989fce0ddeff9f90869f0b9940e2d9290598bcbecc2577c6cb212a1c9552e82e0f410a728cd707473def5db329492a3ea508f70f5f537d034fb91ccd9962ff6ddd524617ffeeaf97539bcb7c1c082016e601ae51a41100fcea4e78b808d86e282e5645c4fe73da6ff6a65716c41f0c7c4afc3a86737cb47349ae020bb8aeadbe62fea8ca1f306e716c0af6c3a6e32e97e6f4e08a7d79a20921eb08ee014cd3b7ae99976e9c01aceefa949d72b7596887b527b1049eca1404d03bb497ca389c6ddd3cb79bfbb83cf8fb3fa3b3d62392bfbbae6683b6b653493cf4f47c98e2558e7eededa970974efed3247f637cd0aacf2b4d64f31420518c658c29960ade24c66e5860568a8994cafb40e53f70330afd9c92643bcec17b82da32960fcc586dcaab22c407ae33eb6b30772e78111d758d5fbbd13de84471f2b1ebaf9214ebe1bdb5f3ed16dba07519452226d0637fad608bcb870c6b01891d8482aaa33951420ff56a4fb66895eb11de844d145a11207d5d98028d1cdb5daa215190ff1f2b3ab673bad092d6c67ace64c44ea3755213a8e5731f06d7c122716b317a778d632be1dd5a15fe4fb05b2b2040756b6a153a3b2f0378983e5310d2e661e1242689cfa9f7fc00ea93556b97a79e119a49441e22fbf22d5e8b031fa07a547a41380ac0e0dbb6b07465408bfdb75709d28881a95fcc5ef7210027d18666cb6dedef1857c7d16c143312d829b26ce2ec5d8aba8dbec66f01fe0cfd493483f57b68069d55ce252a3633333aa17acd5d2e90c2881629367770b985c4ab6f74a8aab530edf305182d91329ff6f53a91ba4e7f42b3e28e66423658c3dc7f581d9a47c776fe7a360049c9560c0a920fac902bfb86028a47a8b2190bebd05cb6430890e267323f3fbe580a9f5414128b898f14ca384969efbf6aca3fe643d9ca878191d81664bff0fb3b8b0ee57768761d36bd868fbd7a01f38babca0f40ad4569a9088e33d83d588174d8671c18b307894d88b53322f61a963282746757c8a545b999ca48f6f27111a4bc4c9ee9748bbb712821246692a7e5cc312dfe1749bdd8c0450b2f6c4957f963cd8332ad06dc1b044e254757a01cff9270a30d36dd09fe118aa69617185afb8e0afdb649f6447427b9518b995d017c9bbdfcf99673de7fb1c9c773281695072420e150d4b38e83f41c2785ebad1e527d10a552e1835ab6bb40495d677a50d6c698c0e258976a98f2d9b80a71fc06c874759827878d7c42429ff853f3dd357a7cb9c74fd73b9d2d7180b1ffdccf9efb9f95f2d3d606d477391139b61a072fd3ac8195d06b6d1eecae51f557b3d54bbc8237f6007e84ed08b7d9f6d7c1cd7f6c3342146ffa628bc9b6bd529f64458ae093f1e53269b2e4691a3c97e07de979c576c5694ad2262d79846d1f2c6c9fe7f420ab840db16aefcd35e8a59440487ff20bba80de493279fe5e2baf205997685b620c0bd6438ffd4e0c2864bf0701a818f07d13f868de84981fbbd3faa43a145d18ec85f0c5ea60a8ee78f15c4c8a38c82d00233d75843b35899442591c87e2f3fe453119325b2a49e1d20b3fedb37e8a66b0338d8ca3e04da318caf3db2640cfe8c4a5be2b9d2b60145ad055604011310ea7b8d2c8f25ac970d362706a1d13aceb264f8bfb36b045c826c19fe2e1d7bc8cd225e9d910a88ec5a863ed98a86d6219f545624fb37ab92475c8f3c1e9e58585e843f0a27e318d34a35ff952096621754f2de4cca0a5945aa92484de9403d2fb3345f954f54c637de474e14a5da8d48fb6bbbd14acadbf0b5c7383dc5d9b138f3f910b763778167abc68630e423bfbadd5c9c18b8eac12f6dc6f775db228dd33d91824995b194ac6b16b97b51197da9b74e47bc11e143e21d9f4cafd155bb919558b7f7541a5d1c10fad57fee46ff5095b0e3a87236d0b7a94b3be92747146b18177ee200e762e98171952dffab3010b19bd6a6a8691f1c859aed21c2611decae67aefa47001531965e669b271bcbceefb914f56a7721c9338468a96ff1437dddc77144f79baa451ffbcbd4d013444cd3235176d23d753cf0ef5cb67f98f33fadae79e09ba5c7d82ec804aefc8b26a0b2e1fcb8e2ec0742d2cf753d69773d2eb4c8ef52069de27151ca901446d8fa368ee172bf0296c7584b79a8ee86a3145562587171a33895c0100b42759181a2d5b75401f9053403ff071943a208dbe7f3db235b424175852d0496bc3cce8a2ccdf191b71d77db433876e91e9712ee71e9004bfc691fe87989b40f6516ad5197c64ad634cda650edbca76a3ed906ee67baf8a39577cf121bb2729b51d560acfe342cd67cb7e2d5c7256fcc620547803b38e1f122638ef1eb1bd9c44431c20732abb50d740da1518efdc0ac222e3eb39e9bd123916d391dcfba0d591631279f3128d0ee5a97f79b3ac865d2f9a60cb9bab0500bfb1bb4d717a7c9a02c0f1a8b96808a089132b351a60d85331e08b00f9b111b3f0e8cdd8f831478fad6160ea346f092ac88a2bd0afa64de6bc8bf32c1a0c859ed7e03ca8b8322de8a5333755cc4b4a9b97d6da84ecadd1ca0476114ead90059f75e29dc1d074e3506af63396af33ce5ba6f264d9abb30bf4de3a67d0cb9df02512706723d13217fc5fdc3719f376c54bb1d4634fad92f50ec4d2bef5e898bbf5a8e984528b899832d9a23fdc6a8441694bb4d619041887969112cf8ee803cc5ae1f11687681333b2947b31fc42af28628ad3345d1", 0x1000}, {&(0x7f0000001300)="267316867d98c8046c05c828ff6e9ff7962b11753d03334cb5cb04a409d4780649423d783b0a49404ed15b7f5985bc39fbfff9513dc96c4b26b2a485d4f49c41b7c2ef70377745e83903d832c9833d6beccf45237bde8bca30347803ff58b698e1a34607522124b804f17f3e68501960a94099d2770e74ebaa63514040c773113b40d2cc699c7162239a18127027f8a5204e44ec3a8b8be155af4115e35fda1eaa4418db7798a705d50c76c3300c0cfa4f62297e774348c17411", 0xba}, {&(0x7f00000013c0)="965e9a28b3846786f599c5c62dc07ec9baea3a9361dfad913441dfc15493cc4827bfb2c6cfa3ffe5b9836772d7fdc3e7bd461f35a6dfb724bb", 0x39}, {&(0x7f00000024c0)="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", 0x1000}], 0x9) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000000), 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000001480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2120050}, 0xc, &(0x7f0000001440)={&(0x7f00000014c0)={0xa4, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x68}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x14}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x24040889) 03:36:53 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') socket$inet(0x2, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000003c0)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="70a9d947cea2f4c24ff8d395f48b26dc59a36d0cb86ec4841db4d68e933c29d93d938bf627c61296968accb386795f5b41496853d68dbb697e0ee62273f363892e37d6d13bba7750c748092b8339fb", 0x4f, 0x62e4}, {&(0x7f00000000c0)="a01d29944293f2673c47907458f5f590cca5bf64c31897d4eb2119a2321560", 0x1f}, {&(0x7f0000000200)}], 0x0, &(0x7f0000000380)={[{@unhide='unhide'}], [{@euid_lt={'euid<', r1}}]}) [ 620.523750][T13265] IPVS: length: 187 != 8 03:36:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:36:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150004008178a8001600400005c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 620.690736][T13275] ================================================================== [ 620.690875][T13275] BUG: KASAN: slab-out-of-bounds in vcs_scr_readw+0xc2/0xd0 [ 620.690889][T13275] Read of size 2 at addr ffff88821939d2c0 by task syz-executor.5/13275 [ 620.690893][T13275] [ 620.690910][T13275] CPU: 0 PID: 13275 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 620.690919][T13275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.690924][T13275] Call Trace: [ 620.690944][T13275] dump_stack+0x197/0x210 [ 620.690959][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.690979][T13275] print_address_description.constprop.0.cold+0xd4/0x30b [ 620.690991][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.691003][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.691018][T13275] __kasan_report.cold+0x1b/0x41 [ 620.691059][T13275] ? vcs_write+0x440/0xcf0 [ 620.691071][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.691086][T13275] kasan_report+0x12/0x20 [ 620.691102][T13275] __asan_report_load2_noabort+0x14/0x20 [ 620.691115][T13275] vcs_scr_readw+0xc2/0xd0 [ 620.691127][T13275] vcs_write+0x646/0xcf0 [ 620.691148][T13275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 620.691170][T13275] ? vcs_size+0x250/0x250 [ 620.691185][T13275] ? iov_iter_advance+0x29a/0xe70 [ 620.691200][T13275] ? security_file_permission+0x8f/0x380 [ 620.691221][T13275] do_iter_write+0x4a0/0x610 [ 620.691234][T13275] ? dup_iter+0x260/0x260 [ 620.691254][T13275] vfs_writev+0x1b3/0x2f0 [ 620.691268][T13275] ? vfs_iter_write+0xb0/0xb0 [ 620.691280][T13275] ? __kasan_check_read+0x11/0x20 [ 620.691304][T13275] ? ksys_dup3+0x3e0/0x3e0 [ 620.691319][T13275] ? __kasan_check_read+0x11/0x20 [ 620.691335][T13275] ? __fget_light+0x1a9/0x230 [ 620.691350][T13275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.691366][T13275] do_writev+0x15b/0x330 [ 620.691381][T13275] ? vfs_writev+0x2f0/0x2f0 [ 620.691396][T13275] ? do_syscall_64+0x26/0x790 [ 620.691411][T13275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.691425][T13275] ? do_syscall_64+0x26/0x790 [ 620.691448][T13275] __x64_sys_writev+0x75/0xb0 [ 620.691464][T13275] do_syscall_64+0xfa/0x790 [ 620.691481][T13275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.691492][T13275] RIP: 0033:0x45a679 [ 620.691508][T13275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.691514][T13275] RSP: 002b:00007fa5d6854c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 620.691528][T13275] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 620.691535][T13275] RDX: 0000000000000009 RSI: 0000000020002400 RDI: 0000000000000003 [ 620.691543][T13275] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 620.691551][T13275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5d68556d4 [ 620.691558][T13275] R13: 00000000004c89aa R14: 00000000004e5b18 R15: 00000000ffffffff [ 620.691576][T13275] [ 620.691583][T13275] Allocated by task 1: [ 620.691594][T13275] save_stack+0x23/0x90 [ 620.691606][T13275] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 620.691616][T13275] kasan_kmalloc+0x9/0x10 [ 620.691629][T13275] __kmalloc+0x163/0x770 [ 620.691638][T13275] vc_do_resize+0x262/0x1460 [ 620.691648][T13275] vc_resize+0x4d/0x60 [ 620.691688][T13275] fbcon_init+0x122d/0x1a90 [ 620.691701][T13275] visual_init+0x30a/0x5e0 [ 620.691712][T13275] do_bind_con_driver+0x54c/0x8b0 [ 620.691724][T13275] do_take_over_console+0x449/0x5a0 [ 620.691736][T13275] do_fbcon_takeover+0x116/0x220 [ 620.691750][T13275] fbcon_fb_registered+0x275/0x340 [ 620.691761][T13275] register_framebuffer+0x5c3/0xa10 [ 620.691798][T13275] vga16fb_probe+0x711/0x825 [ 620.691864][T13275] platform_drv_probe+0x8d/0x140 [ 620.691875][T13275] really_probe+0x291/0x710 [ 620.691888][T13275] driver_probe_device+0x110/0x220 [ 620.691900][T13275] __device_attach_driver+0x1c9/0x230 [ 620.691911][T13275] bus_for_each_drv+0x172/0x1f0 [ 620.691924][T13275] __device_attach+0x237/0x390 [ 620.691935][T13275] device_initial_probe+0x1b/0x20 [ 620.691944][T13275] bus_probe_device+0x1f1/0x2a0 [ 620.691983][T13275] device_add+0x14fe/0x1d00 [ 620.691997][T13275] platform_device_add+0x34d/0x6c0 [ 620.692050][T13275] vga16fb_init+0x15f/0x1d6 [ 620.692064][T13275] do_one_initcall+0x120/0x81a [ 620.692087][T13275] kernel_init_freeable+0x4ca/0x5b9 [ 620.692101][T13275] kernel_init+0x12/0x1bf [ 620.692115][T13275] ret_from_fork+0x24/0x30 [ 620.692118][T13275] [ 620.692123][T13275] Freed by task 0: [ 620.692128][T13275] (stack is not available) [ 620.692132][T13275] [ 620.692141][T13275] The buggy address belongs to the object at ffff88821939c000 [ 620.692141][T13275] which belongs to the cache kmalloc-8k of size 8192 [ 620.692154][T13275] The buggy address is located 4800 bytes inside of [ 620.692154][T13275] 8192-byte region [ffff88821939c000, ffff88821939e000) [ 620.692157][T13275] The buggy address belongs to the page: [ 620.692172][T13275] page:ffffea000864e700 refcount:1 mapcount:0 mapping:ffff8880aa4021c0 index:0x0 compound_mapcount: 0 [ 620.692190][T13275] raw: 057ffe0000010200 ffffea000864d408 ffffea0008622508 ffff8880aa4021c0 [ 620.692204][T13275] raw: 0000000000000000 ffff88821939c000 0000000100000001 0000000000000000 [ 620.692211][T13275] page dumped because: kasan: bad access detected [ 620.692215][T13275] [ 620.692219][T13275] Memory state around the buggy address: [ 620.692229][T13275] ffff88821939d180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 620.692240][T13275] ffff88821939d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 620.692249][T13275] >ffff88821939d280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 620.692255][T13275] ^ [ 620.692264][T13275] ffff88821939d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 620.692275][T13275] ffff88821939d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 620.692280][T13275] ================================================================== [ 620.692283][T13275] Disabling lock debugging due to kernel taint [ 620.692518][T13275] Kernel panic - not syncing: panic_on_warn set ... [ 620.692535][T13275] CPU: 0 PID: 13275 Comm: syz-executor.5 Tainted: G B 5.4.0-syzkaller #0 [ 620.692547][T13275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.692555][T13275] Call Trace: [ 620.692574][T13275] dump_stack+0x197/0x210 [ 620.692613][T13275] panic+0x2e3/0x75c [ 620.692628][T13275] ? add_taint.cold+0x16/0x16 [ 620.692643][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.692659][T13275] ? preempt_schedule+0x4b/0x60 [ 620.692675][T13275] ? ___preempt_schedule+0x16/0x18 [ 620.692692][T13275] ? trace_hardirqs_on+0x5e/0x240 [ 620.692707][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.692722][T13275] end_report+0x47/0x4f [ 620.692735][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.692749][T13275] __kasan_report.cold+0xe/0x41 [ 620.692763][T13275] ? vcs_write+0x440/0xcf0 [ 620.692776][T13275] ? vcs_scr_readw+0xc2/0xd0 [ 620.692789][T13275] kasan_report+0x12/0x20 [ 620.692804][T13275] __asan_report_load2_noabort+0x14/0x20 [ 620.692817][T13275] vcs_scr_readw+0xc2/0xd0 [ 620.692830][T13275] vcs_write+0x646/0xcf0 [ 620.692846][T13275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 620.692861][T13275] ? vcs_size+0x250/0x250 [ 620.692876][T13275] ? iov_iter_advance+0x29a/0xe70 [ 620.692892][T13275] ? security_file_permission+0x8f/0x380 [ 620.692908][T13275] do_iter_write+0x4a0/0x610 [ 620.692921][T13275] ? dup_iter+0x260/0x260 [ 620.692943][T13275] vfs_writev+0x1b3/0x2f0 [ 620.692957][T13275] ? vfs_iter_write+0xb0/0xb0 [ 620.692971][T13275] ? __kasan_check_read+0x11/0x20 [ 620.692992][T13275] ? ksys_dup3+0x3e0/0x3e0 [ 620.693006][T13275] ? __kasan_check_read+0x11/0x20 [ 620.693020][T13275] ? __fget_light+0x1a9/0x230 [ 620.693035][T13275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.693049][T13275] do_writev+0x15b/0x330 [ 620.693063][T13275] ? vfs_writev+0x2f0/0x2f0 [ 620.693078][T13275] ? do_syscall_64+0x26/0x790 [ 620.693093][T13275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.693107][T13275] ? do_syscall_64+0x26/0x790 [ 620.693122][T13275] __x64_sys_writev+0x75/0xb0 [ 620.693139][T13275] do_syscall_64+0xfa/0x790 [ 620.693151][T13275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.693158][T13275] RIP: 0033:0x45a679 [ 620.693170][T13275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 620.693177][T13275] RSP: 002b:00007fa5d6854c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 620.693188][T13275] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 620.693196][T13275] RDX: 0000000000000009 RSI: 0000000020002400 RDI: 0000000000000003 [ 620.693204][T13275] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 620.693211][T13275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa5d68556d4 [ 620.693219][T13275] R13: 00000000004c89aa R14: 00000000004e5b18 R15: 00000000ffffffff [ 620.694478][T13275] Kernel Offset: disabled [ 621.553203][T13275] Rebooting in 86400 seconds..