0, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000000)=0x80) 15:33:35 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1572.810757] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1572.921146] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1572.965290] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x2000) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}, {@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iocharset'}}, {@uid_lt={'uid<', r1}}, {@subj_role={'subj_role', 0x3d, 'euydG-\x06A\xebWV\x9a\x8d\x99\x9b\xa4\x90\x9c\xdd\xb0GA\x9cO\xb9zu\xe1\xcd\xb2\x1d\xb6\"\xdbS\xf4A\x0f\xf3\xb1pL\x84\xff,\x13\xc2\x99PPT\x13(\xac=wNo\x8c\xee\x87\xa5\x99\xf2\xd2\x9b7b\xceI\xbc\xb3N\xba\xeaB\xc1\x008\xb9(\x98]\xb5\xb5\x93Z\x92riN\x12\x8e-E\xa7\xec\v\xcdz[k\xb5\xae@\xa5\xf9\x15\xff\xa94\x81\xba\x91v\x84\xda\x84\x96\xbc\xb8\xeb\x1f\x03n \xbf/E\xed\xa2kCb\xcbmp3\bp\x85\xf8Ca\x8e|\xad\x97-\xd2\x1c\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\xd5ew\'I\'\xcd\xfe\xbf0\a\xca\xb5\xd7@4\x86\xb9\xfc\xea\xe8\x94\xf8\r\xc3\xfc+|\x89\xfe;\x1b,\x92Ig<\xbe\x06\x19Iq\x16\xa6\xe5\xd6y\x7f\xaa\x8d\x97tf\x86\x14'}}]}) 15:33:36 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:36 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1573.232232] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0xb4486, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) futex(&(0x7f0000000240)=0x1, 0x1, 0x1, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300), 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000340)={{0x2, 0x1, 0x800, 0x0, 0x80000000}, 0xb85, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x5f, 0x7, 0x80000001, 0xd1}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x19, r4, 0x1, 0x2, 0x6, @random="0bb4456a0afc"}, 0x14) 15:33:36 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1573.277745] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1573.308231] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1573.313225] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)={[], [{@uid_gt={'uid>', r5}}, {@euid_gt={'euid>', r5}}]}) [ 1573.457450] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:36 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:36 executing program 3: r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) accept4$ax25(r0, 0x0, &(0x7f0000000000), 0x800) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000000c0)=0x400, 0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) [ 1573.543423] jfs: Unrecognized mount option "uid>00000000000000001791" or missing value 15:33:36 executing program 4: r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) recvfrom$inet6(r0, &(0x7f00000000c0)=""/158, 0x9e, 0x20, &(0x7f0000000000)={0xa, 0x4e22, 0x9, @empty}, 0x1c) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@subj_user={'subj_user'}}, {@seclabel='seclabel'}, {@fsname={'fsname'}}]}) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000100)={r3, 0x2}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000001c0)={r3, 0x2}) 15:33:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB='$\x00']) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2100, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5ab0ad0e, 0x20000) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000180)={0x2, 0x1, [0xffffffff, 0x7, 0x666, 0x8000, 0x401, 0x5, 0x8, 0x676a]}) 15:33:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e85297dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c103532c59b890e3318cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f871936b4f5129e6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348eb5dc4efcf0f54090cde6458e2beab32dd25beb6f6f799ba2a47ebe959771e90f15f92863b320216f2a400f4610beb413baf391a6bba805f89d08c0292e2fdb6b926a0bae4667eb11"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:36 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1573.660596] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1573.785935] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1573.830121] jfs: Unrecognized mount option "iocharsecrnmdn" or missing value [ 1573.894797] jfs: Unrecognized mount option "subj_user=" or missing value [ 1573.908699] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1573.912831] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:36 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) 15:33:37 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:37 executing program 4: r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) recvfrom$inet6(r0, &(0x7f00000000c0)=""/158, 0x9e, 0x20, &(0x7f0000000000)={0xa, 0x4e22, 0x9, @empty}, 0x1c) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@subj_user={'subj_user'}}, {@seclabel='seclabel'}, {@fsname={'fsname'}}]}) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000100)={r3, 0x2}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000001c0)={r3, 0x2}) 15:33:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c00cfd30ff91cd3000000003300"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syncfs(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = geteuid() mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x14840, &(0x7f0000000200)={'trans=virtio,', {[{@access_any='access=any'}, {@cachetag={'cachetag', 0x3d, 'jfs\x00'}}, {@privport='privport'}], [{@obj_type={'obj_type', 0x3d, 'vmnet1@&wlan1&md5sum'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@uid_gt={'uid>', r3}}, {@audit='audit'}, {@euid_gt={'euid>', r6}}, {@euid_gt={'euid>', r7}}, {@fsname={'fsname', 0x3d, 'nodevcgroup\xe3+ppp0mime_type'}}, {@appraise='appraise'}]}}) 15:33:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}], [{@dont_appraise='dont_appraise'}]}) [ 1574.174067] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1574.206807] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1574.257886] jfs: Unrecognized mount option "subj_user=" or missing value [ 1574.264479] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1574.313521] 9pnet_virtio: no channels available for device syz [ 1574.338339] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1574.381680] jfs: Unrecognized mount option "dont_appraise" or missing value 15:33:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB="908353004997020f292f4d3b520a3b11c0e9c25d0052896aad380b36fa647a9728c54a12ac037439db0460eb379097484716a309cba231685229e1961a1199ccb44894f2f15c3a8ce7e1dc063f3bf584dc6cd49d825268e4803241584ac713b0e5c1575c6ec31415226cfa9a9d65ea4586b3b6630327bbb512e21429f57737c7cb187bb5fdb7a9d5917c2b253d70b82d7a9c192ad721b392c10e"]) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x1000, 0x3, 0x5, 0x8, 0x20, 0x5, 0x2}}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x10, 0x48}) [ 1574.446428] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1574.453868] jfs: Unrecognized mount option "dont_appraise" or missing value 15:33:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x10000, 0x0) mq_notify(r0, &(0x7f0000000140)={0x0, 0x23, 0x1, @thr={&(0x7f0000000380)="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", &(0x7f00000000c0)="fb4712ac2e7044d706654e7f5ffa6a7175de998039d39096a7e7515bd8ab91f79ae65616a983a203d8b6a3aa4e35303eb69501073b403a35a2f492a639b59f23ed54e2b6bf6807d4455f0ce723b85c878db4c1580ff6334056fb88303df96c9173e0656f4bd4ccc0"}}) r1 = socket(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002980)={@empty, @remote, 0x0}, &(0x7f00000029c0)=0xc) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000002ac0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002a80)={&(0x7f0000002a00)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000128bd7000fbdbdf250200000008000b0140000000080061000200000008003f000200000008002600ffff000014002580050001000100000006000400f9ff000008000a0106000000050059000000000005003e000600000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}, 0x1, 0x0, 0x0, 0x3dcc146c955e1297}, 0x80) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x2000000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @offset=0x401, 0xfa, 0x0, r1}) fallocate(r1, 0xa, 0x8, 0x81) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x85d, 0x304d}) 15:33:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1574.636626] jfs: Unrecognized mount option "euid=00000000000000000000S" or missing value [ 1574.751428] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1574.777068] jfs: Unrecognized mount option "euid=00000000000000000000S" or missing value 15:33:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}], [{@dont_appraise='dont_appraise'}]}) [ 1574.920210] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:37 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x1200000, &(0x7f00000000c0)={[{@discard_size={'discard', 0x3d, 0x9}}]}) [ 1574.990084] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x10000, 0x0) mq_notify(r0, &(0x7f0000000140)={0x0, 0x23, 0x1, @thr={&(0x7f0000000380)="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", &(0x7f00000000c0)="fb4712ac2e7044d706654e7f5ffa6a7175de998039d39096a7e7515bd8ab91f79ae65616a983a203d8b6a3aa4e35303eb69501073b403a35a2f492a639b59f23ed54e2b6bf6807d4455f0ce723b85c878db4c1580ff6334056fb88303df96c9173e0656f4bd4ccc0"}}) r1 = socket(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002980)={@empty, @remote, 0x0}, &(0x7f00000029c0)=0xc) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000002ac0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002a80)={&(0x7f0000002a00)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000128bd7000fbdbdf250200000008000b0140000000080061000200000008003f000200000008002600ffff000014002580050001000100000006000400f9ff000008000a0106000000050059000000000005003e000600000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}, 0x1, 0x0, 0x0, 0x3dcc146c955e1297}, 0x80) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x2000000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @offset=0x401, 0xfa, 0x0, r1}) fallocate(r1, 0xa, 0x8, 0x81) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x85d, 0x304d}) 15:33:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.075308] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1575.077367] jfs: Unrecognized mount option "dont_appraise" or missing value [ 1575.171751] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1575.182981] JFS: discard option not supported on device 15:33:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x10000, 0x0) mq_notify(r0, &(0x7f0000000140)={0x0, 0x23, 0x1, @thr={&(0x7f0000000380)="8ad25cad3d3507f59256b8fe50e363caec9f823b6eb57187407af03f6f109375a801c22b545f1976f22d381f130c043c487dd1f5e24203e7c388a7abdc677b72cf27c2bd2b8e83df242082bb16c33b1d440742accd0a1900a4122f1f9fe4d0255565e5a5f5f8ba8a4406011f0cdcd544d4732214c4f775f3c7970f1a9833a6295c2562379f605d22a463abf306f6a52f8d4a9affa5be8c85bec76df067bd12f64940ef9a8c82c44d80e08353062dc0e32aab2b661b7cdac7b4b2f569d23c528a730bcb1f2fc3f6ed778f3c088c864c3ced60a8af6b3a18d483e82ef1c04e5a1d2e464880881625cb6db13293b18e805ed63b061e60c330e501f18de556c84f326d95ddc7c9af2a58ad1fa3a3f8f5595b6dc0ea4c146eccc1ae6a33d28e3c51ac11cbff1d26234ea8506978b8e7581383776b18a8e63b38d3c37abbb04d97be38b3289d4796fba0c0550b833bca8026322e206ce64e5a857b476d479b42f0c857eea31763b24335eaf96d286804bede0fffb0eef89513dcb8bedd0b0b326eafba6353fa36ea472b4769a1ad96f2540a60a1012631aa010432337692065cecd84fb495dc1ba1e4fb2c7eb3d078f58eb2a67c3ade5e1a3f4ab94da64e46d093efb201d2fb51d632e8a6ac06a082e42d73027e034014fa5aea0642b927c00020a8a79cb40468ea5ea6fc4ce5ca4fe6585bfa155f2ac7c4006990a273dca1b3eec1edceff4f1d3cc43bca43f7249f7786bc6ad49e924dd20087772231673e29e7602df69999c5961e31b51562ddc79046b0027619e1853238494c4ffd0f8eb2d7365311c00b0d216d66d262404548930ae9970a216340253311ecc44224f6ee919bb0058bcdaa1b564f18d1006c977fa5bbb5f671df851924cb7564eaac977898348710c1dc4257af8acee5f7fd1f1836abf7373549dc79ed2eeed0114d89fd6ec6da8863be52c02de02852b631a9ca97091c56f742a925bbe49f3eaed2705dc6b3080c61e0d456d4ca8fbf4fc55b23a6d7c32623e7bf484c26b03ebc2139b68b56d028e03bdf75577c8e69edac2eb7a65035f137b3a92776e364c4bad6310cf84fa43b04fab64a894eea7125c6e2cf74d2eb98fa666a99168cf07c3861f7dbca1030759fbdc210c9eefe065f39f4c575234e8d9f490500aff3b49e44539e16eb63df49be9a6a9b5703b7fd8190c11d33360c8f17de6bd0525267c3f0259b10e33d562de8e82cf0508bbf0b68e61deb47ed0870efd8e118e717fe8205d2fbd3d051cc80f68f06a867cc1bdfdca294f08b1babf2296ac27e8f834e49a0a74bb6d66f5e1fd57ddfd819ad83f9534c170a23a0f5faf4490dac45a928969a52749a93eff8bf6d5af4ed5aa5de0d6716d72f3bd5b3b8fa5a75e7338c896dca5af8cad2603b172059d10773948f51ec52148dc0ecf8d14e12e6e1798ab004fcf4091a8ff605cbce52548e22a362189433ccc0bf9fccdf196314f695429c90bf6b9776be26d3be934b3d9d82bc38f61cbb46254ecd8f33b6b4b81cfacf30b82e1f3a156d1cc00292083363a7ac3f9a689339f772e6793f73865f6b04e8a52ada2243afde20040cde351a300c1c965ee88f9d21cd4d12f4c035bb2d77c7aef173a60f044c75e4a20ab56e00499d2d6060cd634184d2c7e6627bc23ef2b41b19ef6a556c27df2c6bfe378c30e462e58e8fe93a559f6e7a808315a213ea0572c61e4a3aa9a5d4a580c79e6563fc5d7b280331d1195548e56a9ef27418b8d00ac8bafe8f6f63c3e674943cb125720272806ae9722f75c9987060fdd2bf356264a09f754f82549a745b90a1d213c1a1dc6636a5bfa124ab4cfc0d77780f73c2e210ea05909273c7ab2dbfedb9e9c12502eb561a8f3d4e824cf6a5539389c333fbf5185671d17c1ff56f6f962a0f9989391e655cd6e165a30ef7b53c30aa470b70fa719a9f324617217d392ad1e9b9ef59cbf1bdf2b882cab9ff7349cf31bcfc98cebfdf6b6832fdc3b1b28246841b76ce0d2b686b85289a0283eb10b61ef3fe3b71b3ffe34ea5641c8681cd161a41a9b29da9b08889a2346e444a6908de824b26d6b42afa1e92f69b6269af06f29ea911daac3b368297ad459558a9b74c7bfae080fbfe05a26b22c9dbf9a49bdbe4d4afe66a4eef1b8b0fb610df57bb41a8c14b1327b5a0499fd4e96eed40d5eb6cb95cb8ecb6807323499468a59e4e17bde93776b9ab3f52901c6bba560164d2b551d04926c234cc68277fa58735d5ed764a92cc464fe4619e89996d50765a071d5385e7472ce432bd74f144825577a39a4a8d35136e7766d76a6edc4a09ca534da923052d3d5a5fd112f73be04e20662c567f19378833b0de56884c4ab0e751eef5f3b58a0505ba35c1317a666b9f40544c2ffc2d657dd8a1e99c958c1f735dca3399a405edf656341ea38f0de0381b02e7d48cc0ed6066a9a6404d79659a14fa19aa0f65524cc76ba4eb5b9824dd7eba4d9b8480bb4083f77b50504bc7aa00eaa85b404d5e408a7433092b57bce38d9000ed9f51c0bb16fab77ab4476b879fa48e4fdafc620b3fb719546c849053bff1df7f7b0227602648c9c95c070a014b7538123aa88ac5959b768609adca191ca3bf198a48b63198904f9b14e2395b47efe8cbfdb6b87e5a2b37faf96a2335906a82f3245d97ae38cc32d081e55468394576b1c4dbd3109b1123667b54c2193d1530b90e0abed0ce267d40b7289a37e28c2e41d634c6c581322b4d2da0de39aa85e9ea0c0bfbd781d92a31a010907a39ca8e6b94590446e27cb0e052d1bccaba693a2d0a3ea51f3d6d559cddb9dec9f20a5cb2c549b2a5e33062a6b3974896571192e769efd0ba7ec52f569ddedea9f9f4885ac7edec40691dfaff3b6002e69dff25190f4031ade5ef91b98af96dd62537429e9650d9495d4a69fcc51e4f490aebcb640405f6809e36537bbd1c8a82f16902b92cb639a9f7d48e5f2206be577d4655b80e39ae2c30b8645280ae48a6fef053a684d937d1bca7465f7a6c9d7b03093afcf3b257011e2e14a5e8393f0fa24ac73ae0dbdd0ad281619b751f346c25227ded6a6f1b25a0b87cdebd7db895cf8fe579e0d03f8a39f5a623c8edfe87ad2d1efb87251927630bcb989da3fbe657fd0ad03138f02e95f5ca6eb4f58834158357c37f03d06a1e4deb8d2a5b9b0f18648d3f5b479804f15064917d2bda44f5488a76ea4d7d638439b8aff0647e9a844c0548726ff48aef40f7aabd097d1ffe452485872c6ac5e252ba8f8c5bd460b0d098ca1ffc3687e1039220c76b3288d90c0bcf5e84b140f3048bb6752bb864432395daca5651beec4221ae13e1fa083c3e04873ae8f7bca17324deabeab0bf4225a195066d7939a163c290a93d92d637fedef2f745944dcc7422fba7e5f33d20915815f856bd97b93782812a788cfe0081ca423d083b04539b4bbda280217fe15e35b896f434b1c0163f868b8796d5388ea970c19702d71a8890bb060248467696f81bb240a473529a05c502c0d98b50d9f12e2ec8e728fac7c54c54085ec1798b341c9f52136c7b42b367e1ec75d925481e9c4a1918662a6f911cba1863bdd0238a60aab013fe95af86e550cf9e291f6e3711536e467564197297ba4d83b6e98cb1b8df8c734d4193320c6049258fcaebfea208c41c74f5379f70daa534249236bfd018112a947056aa3e4ebec10f75d60bfec99a11d0831c99bf8cf28bf3fdc599cb74262960d99b73603fadd04ebe683fb0d5381a5f28321d4c891613b70d799d7542d18ef1973570e719f62ffe28ebf65d1aefd75bcd0cb33f9eb4fa7e68023bf6f876b133d8e1fa6ec461d89ec6361644f1442165692568c035d42e94c68b342e49f868bf7e61e70b27a37e4b4fb192ecce0942c2a16740edff42cf7bd61814d2090bd3b9aa5b623b6c887484e4f6799e8cba78b424f82070e49a8144690bc1ff6d89a3515bd1925909b89f11eaef1f1286c3d77609614824894bb5f526293e684a439cdb6a2e88268d42819939415030bcaff6929a2c215d68fc583df3572b59eaa0c80ec45ac81d9cb5ea2a6d1daca91e9574afce29059ba3cc58465c7a1e7d6ebd2500117ac656c80a118938224b21f8dfeb0cb2942affbc130e811e56325ead0cc0fb62ba53e5b7bb9fedc41948fbf9f41182f522ece612d25a7321bdc6c0b36cadc39eeebbc72198bd37bd6c8a76def03252a6fcbfa55874201ac467cc1db16b7dc2c92bb511fdc7aa6593a47e2c73dd463433a15c8ef11be09edda8c78b428ca0fcfa24e96a668c41d0fca05a51da450f2655f61905bc8d0856e219ae0f93c06c39ca647eacf87b6fbad3127b83967061bed9ec8c985c51ff16a7e30bd1532b362a110f274be462d606cf18586d31326c96a3307adc2fec03fb246d5def83d01c72d44d93024aded67e8611f475730207f37d56768235ff72bb4ef87d565a31940a5e540e566a41f578b4938c72ebb432891a831281a44cc0fa15eadb2aad6c2c2d9fe5a08b48e1a2d86c1df93a22ca80b533022a2e8aece0322384e9610d248882d8a0613aa4d4e2d04a2dbc905bc53c31e038ad48b9ad8bbbfd5738fe9c07500cee195dfe5329c2de820318a255cbcaa5f5e7783f28107fb8df3019c1fd01cede6aa48975852019098ad305e17a19e76e08ad64871f610ba9d2389653c78c78e8075064de66942cce8cf95ea054b426d55e3324b380271036450740c47cff2fe01fc1f8b33cda9d4ec83acfd9da96eed89152fd268db4ddac1ee3eb627805ec17f2066ce664a471e8f19e0ce9aafb84416af4be789dcb22408a481161ff165463c410b07f3bd5105daa6d0b041a31a89e6ca77898a120371ca2f3fcd6b687909db8a2aaa0c426e5fa3c651b97daa4fec75ac1420888a11f96309777e4dbead84510fb20c6e374164e4fcf2e08f782d356abde3b0406fd1b3e4b68aa2a4d81c64daca78f7552cb36c4dd487931dd881302a01918191261aae135b462c6ae16c72d6049cc30fac7fd43d2282c13b50f83c401568a9b47e0943bc65094b94d28dd865cc4758620dc98c9165cae7543fadf1fe5c7f6bd5286aff03659170f0bd177ef011444217b2b8da3dac433b4a1c23363817c50eace1d787af68fc511657b92e8fd7bbc63b3ce84da4d7834c6a8882c410d0c0b28746dfa54029fae9faa16344ea5e9a0b7f30d86f65205cba7d161d52e5050a90cd13aebb840b53e5e2f515bb9ad93f25dfa78260635fa602e08231e33ce337ed98dc821096899559e67f616d314edc48ce75f1fa5a8240deae7e3dd569c867e55c6562f6446cd2688398c8d32abba34a646fc75cfd2d7db96de800be0d1bf2834c113c64cafb872269e0ab6b3e741a561fbb43a16ff2eef84902fccfa308b77561ddbf921c8bc8a3a373e915c6563912f702ab0de6882e1ef7e8a5abdbf090c2f33ac9896204e5b4b7c9306ce3842c649e6156531f44ffb6ddbd5776dd779536d32fae46cd4f48531b670a19d070af1d50be826034efc713f2a4de99b966103dbc4be775712e3ccfc532071339172ea72bca03c874e603f0254d1ec9382ca9c21de0343ccfe93ca48a60141f5ef4904e6e66e89b4f20f8f18f51e29ed0caaba7f12d72545ea205dd933f43a103a3a19e37effb012a87483009aeb3780c7d3656158099faaedb9860c013b46a2674c06b92ad7b3dad252d140bae12af9d92452d5c67d1817c3cfae911e6f1ec3837b5fed5aa60e02b2ca4f4ccb9cd110742a4a2d021a4b6aae7612ca6f6975dcf650525bcb342949f1f6c481bc0b953c3aa06897", &(0x7f00000000c0)="fb4712ac2e7044d706654e7f5ffa6a7175de998039d39096a7e7515bd8ab91f79ae65616a983a203d8b6a3aa4e35303eb69501073b403a35a2f492a639b59f23ed54e2b6bf6807d4455f0ce723b85c878db4c1580ff6334056fb88303df96c9173e0656f4bd4ccc0"}}) r1 = socket(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002980)={@empty, @remote, 0x0}, &(0x7f00000029c0)=0xc) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000002ac0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002a80)={&(0x7f0000002a00)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000128bd7000fbdbdf250200000008000b0140000000080061000200000008003f000200000008002600ffff000014002580050001000100000006000400f9ff000008000a0106000000050059000000000005003e000600000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}, 0x1, 0x0, 0x0, 0x3dcc146c955e1297}, 0x80) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x2000000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @offset=0x401, 0xfa, 0x0, r1}) fallocate(r1, 0xa, 0x8, 0x81) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x85d, 0x304d}) [ 1575.240869] JFS: discard option not supported on device [ 1575.252476] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:38 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB="00abbe00"]) r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x220, 0x13, 0x100, 0x70bd28, 0x25dfdbfd, {0x22, 0x3f, 0x71, 0x3f, {0x4e23, 0x4e23, [0x9, 0x4, 0xfffffff7], [0x400, 0x7fffffff, 0x4, 0x6], 0x0, [0x4, 0xc1f]}, 0x7}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x50, 0x1, "d0a9a339895c9edd699c5f58ee59465a14c980ab6b3b27cbf50d44cc3b4f166c12aa2e25408350e5c844abb8ae99651c516e25cf2bef2552c6f31e409bfcc7d7ee75d8c35d58687769fb99d1"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "35f3ca2ee157aa10e71d66e8c8a399421bc84857528c1189dc8c51222c518db957e07c7d4acd4b6a321607f110e0f5bfcacf8b946a2d3074b12e8ab4443fa6712527ebc295d2083daa57678749e13b46a163a2a43e0c972342801b3ad64f2a89def518a025dfd0bd1ea83cbc7b51c711a1b3705c6d9abd0c5f363496aea49b5ee9c5756babc87960d61f458506f1a91f019a0de04d999271bc48265ce01b53ef01454b5353a9589e2068bdc9a321c8bf148f1ea88d9af5e77225499111cd6d5d8ec477d84973f7563bfc54216a059b173a75693583468b3e2489cd1ce4e7405590b91f12adc85cd11edc877eca0cd9bee4c4661484e1842f72"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "b3aad20047101040303e22f09ff1e183964b57745a1e4d73ea862e553d961633d5eeee5ebf3159048b9baef26f7aca9aa35545a3bdf9a897e377d23d76a48dbeaa54176893c48e0a1ff8470a2bb90cc3acaa6d96088914c09056fdc0806ae1223c21a676f011d575973bbdc765d813cd63a7f8db9cff22e99b"}]}, 0x220}, 0x1, 0x0, 0x0, 0x40}, 0x40054) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000810) 15:33:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.365335] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20010}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d61842c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) [ 1575.476550] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1575.505501] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.529025] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:38 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.665693] JFS: charset not found [ 1575.670707] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1575.739689] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:38 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:38 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000100)={{0x40, 0x5}, {0x5, 0x51}, 0x401, 0x1, 0x8}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'euid'}}]}) 15:33:38 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.897589] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:38 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1575.996388] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1576.015981] jfs: Unrecognized mount option "smackfsdef=euid" or missing value 15:33:39 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000000)={0x7, 0x0, 0x1, 0x6}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d616e2c657569643d5a3640d04402505f8ca02ec8ea02c8a1946c87cd4182bf73f8255bf9aa40020000000000007e99c619976a1d827b616ad94690cc55fadc50e51ca0d20d565b0c1cfb7c243b0409e73a730861a99afec121f6f67a5374202bb1dced796ac9fe9a96618c0cf4c96105f5043a84dbfc83a8c0fd389b58aac0861672d147f3e230ab667ddf63f2c56e118ce8c4ba483f4a1382ce2fd8ea1be189a4818400df4a4e95024ed092f4776f236943822620cea52c324263c9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1576.061927] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d61842c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) [ 1576.107403] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1576.241081] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1576.264322] jfs: Unrecognized mount option "euid=Z6@DP_.ȡlAs%[@" or missing value 15:33:39 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:39 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) 15:33:39 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) [ 1576.524298] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1576.575894] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1576.652373] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:39 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) 15:33:39 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:39 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[], [{@euid_eq={'euid'}}, {@fowner_lt={'fowner<', r1}}, {@obj_role={'obj_role', 0x3d, 'jfs\x00'}}, {@euid_eq={'euid'}}, {@obj_user={'obj_user', 0x3d, 'euid'}}, {@subj_user={'subj_user', 0x3d, 'fowner<'}}, {@pcr={'pcr', 0x3d, 0x3c}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r1}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 15:33:39 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1576.803763] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:39 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) [ 1576.856299] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) [ 1576.863223] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:39 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:39 executing program 3: r0 = socket(0x0, 0x0, 0x0) r1 = signalfd4(r0, &(0x7f0000000280)={[0x6]}, 0x8, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x77359400}, {0x5, 0x0, 0x6, 0x2, 0x5, 0x1f, "d0ffff00"}, 0x8, 0x3, @userptr=0x6, 0xfa, 0x0, r1}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r2 = creat(&(0x7f00000001c0)='./file1/file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000000)=""/64) r3 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r3}) timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) timer_settime(r4, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r5 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r5}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f00000002c0)="7c01ae225c94e230bb128b5094b63002eab49ede29771f3ccb4b206dc05b17cc07564e5a3534ea5813be4e3a1f37421543c5eb79c88600d4a9c43426277d798982540e9d9b396b35b688d20eb63abb5e7cd19359b145caa600015639aafdbdb864568fbe195dfa26ed") timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) timer_settime(r6, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) timer_settime(r7, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES64=r5, @ANYRESHEX]) [ 1577.065073] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:40 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:40 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:40 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1577.203752] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1577.227009] FAT-fs (loop1): Filesystem has been set read-only 15:33:40 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1577.298862] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1577.324551] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:40 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1577.459997] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1577.532137] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:40 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) 15:33:40 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:40 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:40 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:40 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:40 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1577.853283] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1577.881394] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1577.889791] FAT-fs (loop1): Filesystem has been set read-only [ 1577.893414] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1577.921902] FAT-fs (loop0): Filesystem has been set read-only [ 1577.956233] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1577.991364] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1578.462649] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1578.471383] FAT-fs (loop1): Filesystem has been set read-only 15:33:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB=',\b']) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) write$dsp(r0, &(0x7f00000000c0)="f9e07c1e0fa1c15e98f363273192b5fe8f976c14e9c5f048b885d0f1f4929d4a9fad6d7c7f3b5239fff3216715936372b74fbfe926e26196f5ccfe1afaadfe930afa0bef9fd2ad6c80676a0286dacd4c5b564962b63af3d1025987434f7b6510758f402958b6f80c0884146e65080a01cc1307027c83e276bc6463bb4620efd24b06b78588bef0838f35b041e4cc3eb86d90a93a871f37d6", 0x98) 15:33:42 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:42 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:42 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:43 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1580.063522] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1580.077087] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1580.096164] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:43 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x400, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid', 0x3d, r1}}]}) [ 1580.334768] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1580.468483] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1580.508051] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:43 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1580.562860] jfs: Unrecognized mount option "euid=00000000000000001791" or missing value [ 1580.575618] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:43 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='quot\a\x00elid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='9p\x00', 0x444, &(0x7f0000000200)=ANY=[@ANYBLOB="74720000000072646d612c706f72743d3078303030303030303030303030346532342c6e6f6465766d61702c06713d3078303030303030303030303030303030362c74696d656f75743d3078303030303030303030303030303830302c7207000000b1886c4014c2242d3030303030303030303638662c73713d3078303030303030303030303030303030352c6673636f6e746578743d73797374656d5f752c00"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000040)) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) 15:33:43 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:43 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1580.725808] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1580.759521] jfs: Unrecognized mount option "quot" or missing value [ 1580.821261] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1580.846789] jfs: Unrecognized mount option "quot" or missing value [ 1580.900232] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:43 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:43 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB="f46051fdf9583196a79d58dddfee8893df7abfa2761e1aac2c00eb2e6f18c1c55cb2bc42fd013e47fbef60438b905a4aca1d2993b466200a0e77b66ffbe668af6dd30d8fd0690d86a3be3b8bcef6cfed57021cb12d853b49ca6587787243f14a5226bc3edcc652d77e545e3737c6b33175fa815e4a5864e89885083ae367770907d7065151cc752006cbb8b1ed9d5aa2"]) 15:33:43 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1581.077337] jfs: Unrecognized mount option "euid=00000000000000000000`QX1Xzv" or missing value [ 1581.093127] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.120991] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1581.123528] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.131756] FAT-fs (loop0): Filesystem has been set read-only 15:33:44 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) getdents(r0, 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file1\x00', 0x100, 0x1ff) 15:33:44 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1581.446754] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.466533] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1581.487120] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:44 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1581.587345] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1581.601637] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:44 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1581.634002] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.716850] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.788361] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:44 executing program 1: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = semget$private(0x0, 0x2000000010a, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000001c0)=0x4) semop(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/249) 15:33:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = semget$private(0x0, 0x2000000010a, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000001c0)=0x4) semop(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/249) 15:33:44 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 3: timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='eui=\x00', @ANYRES32=r1, @ANYBLOB="81d8c4f6d7ed98074c71c409c4cd03143250b8"]) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x401) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) socket$inet_icmp(0x2, 0x2, 0x1) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) setresuid(r4, r6, r8) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) 15:33:44 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1581.915722] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1581.926281] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:44 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) r0 = semget$private(0x0, 0x2000000010a, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000001c0)=0x4) semop(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x1800}], 0x1) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/249) 15:33:44 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1581.955915] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1581.969854] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x59}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='resize') syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="726573697a653d3078303030303030303030303030303766662c657569643db98691136c0b2a524793300d0278ccee23a09c7eeb133c098aa3ca84769faa0224efcdc50e9586dce32b8c06d0734d16f1bc311441ed3a04afdbe814956200fdbd80b8e5e5df89e035decc5664f3ea836c56f51c223ac1139c050ae2960522602dea8ba4d66e665b9ac39463706d2ad0db07dc4cf5fa21b3c9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 15:33:45 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1582.086215] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1582.113768] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1582.117159] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:45 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:45 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x59}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='resize') syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="726573697a653d3078303030303030303030303030303766662c657569643db98691136c0b2a524793300d0278ccee23a09c7eeb133c098aa3ca84769faa0224efcdc50e9586dce32b8c06d0734d16f1bc311441ed3a04afdbe814956200fdbd80b8e5e5df89e035decc5664f3ea836c56f51c223ac1139c050ae2960522602dea8ba4d66e665b9ac39463706d2ad0db07dc4cf5fa21b3c9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1582.263455] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1582.291372] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:45 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:45 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1582.324244] jfs: Unrecognized mount option "euid=l *RG0 x#~< ʄv$+sM1A:b" or missing value [ 1582.400854] jfs: Unrecognized mount option "euid=l *RG0 x#~< ʄv$+sM1A:b" or missing value [ 1582.464903] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1582.512077] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:47 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="696f638061727365743d6d6163726f6d616e2c00"]) 15:33:47 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c204000001"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:47 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1584.985558] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1584.995092] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:47 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:48 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1585.258809] jfs: Unrecognized mount option "iocarset=macroman" or missing value 15:33:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@quota='quota'}], [{@euid_eq={'euid'}}]}) [ 1585.335407] jfs: Unrecognized mount option "iocarset=macroman" or missing value [ 1585.357655] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1585.362193] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:48 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:48 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1585.494043] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d616e0f2c"]) [ 1585.599613] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1585.610246] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:48 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:48 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:48 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c204000001"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:48 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:48 executing program 4: r0 = creat(0x0, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1585.821133] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1585.845958] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) rmdir(&(0x7f0000000400)='./file1\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9a0000, 0x4, 0x80000000, r1, 0x0, &(0x7f00000000c0)={0x9a0908, 0x4, [], @p_u8=&(0x7f0000000000)=0x5}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000840)={0x50, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}]}, 0x50}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x0, 0xc, 0x3}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_UDP_SPORT={0x7, 0x1a, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000010}, 0x40) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f00000003c0)={0x5, 0x5, 0x0, 0x100, 0x1a78, 0x2d9b, 0xc}) [ 1585.922215] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1585.941064] FAT-fs (loop1): Filesystem has been set read-only [ 1586.035426] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1586.040112] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1586.105403] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:49 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:49 executing program 4: r0 = creat(0x0, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1586.323949] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='Yocharset=mac\a\x00\x00\x00\x00\x00\x00\x00id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1586.408588] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1586.434318] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:49 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:49 executing program 4: r0 = creat(0x0, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1586.546935] jfs: Unrecognized mount option "Yocharset=mac" or missing value 15:33:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x30801, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@umask={'umask', 0x3d, 0xffffffff00000000}}, {@usrquota='usrquota'}]}) [ 1586.652294] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1586.689656] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:49 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c204000001"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:49 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r0}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@euid_eq={'euid'}}]}) rmdir(&(0x7f0000000400)='./file1\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9a0000, 0x4, 0x80000000, r1, 0x0, &(0x7f00000000c0)={0x9a0908, 0x4, [], @p_u8=&(0x7f0000000000)=0x5}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000840)={0x50, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}]}, 0x50}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x0, 0xc, 0x3}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_UDP_SPORT={0x7, 0x1a, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000010}, 0x40) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f00000003c0)={0x5, 0x5, 0x0, 0x100, 0x1a78, 0x2d9b, 0xc}) 15:33:49 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='iocharset=macroman,euid=', @ANYRESDEC=0x0, @ANYBLOB="39e18bfd41e49db8ada4a22f36dbaf167142883d2071e53989fa34a022064104fb2984eda81bfa43f7bb6afb111256d12678bc0408ef8218789f53f9f620ff04d005eb656aedfd90f2f809190951764dfa7bf41498c164a6ea1d70cc6a593187f13c1a2d66722391deb1f764c3cc840274"]) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) [ 1586.882649] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1586.908487] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1586.921069] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 15:33:49 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1586.947041] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:49 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c204000001"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:49 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r0}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1586.999109] FAT-fs (loop1): Filesystem has been set read-only [ 1587.063683] jfs: Unrecognized mount option "euid=000000000000000000009A䝸/6ۯqB= q94"A)CjV&xxS ej  QvM{dpjY1<-fr#ޱd̄t" or missing value [ 1587.066061] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1587.185128] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:50 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r0}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:50 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1587.244148] jfs: Unrecognized mount option "euid=000000000000000000009A䝸/6ۯqB= q94"A)CjV&xxS ej  QvM{dpjY1<-fr#ޱd̄t" or missing value 15:33:50 executing program 0: timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000280)={{r1, r2+60000000}, {r3, r4+10000000}}, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='irset=macroman,euid=', @ANYRESDEC=0x0, @ANYRES64=r0]) r5 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r5}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r6, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r6, 0x10, 0x70bd25, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 1587.412649] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1587.425661] jfs: Unrecognized mount option "irset=macroman" or missing value [ 1587.444133] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:50 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:50 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:50 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861727365743d6d6163726f6d616e2c6530b0930646b43958145ed9baa463bf8c5190ff0255f5c65fddd7700dba1c9e5ddd11b6dc072c64ddf05bcd23", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1587.798170] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1587.807473] FAT-fs (loop1): Filesystem has been set read-only [ 1587.819861] jfs: Unrecognized mount option "e0F9X^ٺcQU_p ]" or missing value [ 1587.829591] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1587.897544] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1587.995050] jfs: Unrecognized mount option "e0F9X^ٺcQU_p ]" or missing value 15:33:50 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:51 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:51 executing program 3: r0 = getuid() r1 = socket(0xf, 0x5, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) keyctl$chown(0x4, r4, r2, r3) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@gid={'gid', 0x3d, r3}}], [{@euid_eq={'euid', 0x3d, r0}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) [ 1588.241429] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1588.277034] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:51 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:51 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1588.426379] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1588.477417] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:51 executing program 3: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1588.521998] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1588.684045] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:51 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:51 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:51 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffbff}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @rand_addr=0x64010101}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x100}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:51 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1588.990562] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1589.012631] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1589.030351] FAT-fs (loop1): Filesystem has been set read-only [ 1589.124363] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:52 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1589.351894] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 0: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1589.455000] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:52 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1589.547403] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1589.586650] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 0: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@gid={'gid', 0x3d, r2}}], [{@euid_eq={'euid'}}]}) 15:33:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) [ 1589.724818] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1589.807269] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:52 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1589.895238] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value [ 1590.071368] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1590.332493] audit: type=1800 audit(1588865633.196:660): pid=16192 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.1" name="file0" dev="loop1" ino=4831 res=0 15:33:53 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:53 executing program 0: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@gid={'gid', 0x3d, r2}}], [{@euid_eq={'euid'}}]}) 15:33:53 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:53 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:53 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1590.501767] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1590.509260] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1590.534402] FAT-fs (loop1): Filesystem has been set read-only 15:33:53 executing program 0: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) keyctl$chown(0x4, r3, r1, r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@gid={'gid', 0x3d, r2}}], [{@euid_eq={'euid'}}]}) [ 1590.548901] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1590.556404] jfs: Unrecognized mount option "euid=00000000000000000000" or missing value 15:33:53 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYRES32=r3], 0x2, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1590.728684] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:53 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1590.820285] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1590.849119] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) 15:33:53 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.041915] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1591.053883] FAT-fs (loop1): Filesystem has been set read-only [ 1591.074602] FAT-fs (loop1): error, invalid access to FAT (entry 0x0000fc00) 15:33:54 executing program 1: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:54 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.177041] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1591.213285] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:54 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:54 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', 0x0, 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.240296] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006641) 15:33:54 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.348914] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1591.379251] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:54 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.484080] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:54 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYRES32=r3], 0x2, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:54 executing program 0 (fault-call:16 fault-nth:0): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1591.595978] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1591.635850] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1591.782695] FAULT_INJECTION: forcing a failure. [ 1591.782695] name failslab, interval 1, probability 0, space 0, times 0 15:33:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:54 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:54 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1591.931680] CPU: 1 PID: 16382 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1591.939600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.948958] Call Trace: [ 1591.951560] dump_stack+0x13e/0x194 [ 1591.955200] should_fail.cold+0x10a/0x14b [ 1591.959352] should_failslab+0xd6/0x130 [ 1591.963333] kmem_cache_alloc+0x2b5/0x770 [ 1591.967482] getname_flags+0xc8/0x560 [ 1591.971283] do_sys_open+0x1c4/0x3f0 [ 1591.975001] ? filp_open+0x60/0x60 [ 1591.978538] ? SyS_clock_settime+0x1a0/0x1a0 [ 1591.982938] ? do_syscall_64+0x4c/0x640 [ 1591.986905] ? do_sys_open+0x3f0/0x3f0 [ 1591.990788] do_syscall_64+0x1d5/0x640 [ 1591.994676] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1591.999857] RIP: 0033:0x45c829 [ 1592.003039] RSP: 002b:00007f79691c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1592.010751] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1592.018016] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1592.025307] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.032576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1592.039843] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691c16d4 [ 1592.069433] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1592.077663] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:33:55 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:55 executing program 1 (fault-call:17 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:55 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1592.196480] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1592.261441] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1592.329125] FAT-fs (loop1): Filesystem has been set read-only [ 1592.337902] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1592.368233] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:55 executing program 0 (fault-call:16 fault-nth:1): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:55 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:55 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:55 executing program 3 (fault-call:17 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1592.498611] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1592.525675] FAT-fs (loop0): Filesystem has been set read-only [ 1592.595197] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1592.655606] FAULT_INJECTION: forcing a failure. [ 1592.655606] name failslab, interval 1, probability 0, space 0, times 0 [ 1592.666941] CPU: 1 PID: 16443 Comm: syz-executor.1 Not tainted 4.14.179-syzkaller #0 [ 1592.674828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1592.684207] Call Trace: [ 1592.686806] dump_stack+0x13e/0x194 [ 1592.690528] should_fail.cold+0x10a/0x14b [ 1592.694679] should_failslab+0xd6/0x130 [ 1592.698652] kmem_cache_alloc_node+0x55/0x7a0 [ 1592.703138] __alloc_skb+0x9a/0x4c0 [ 1592.706749] ? skb_trim+0x160/0x160 [ 1592.710377] ? __lock_is_held+0xad/0x140 [ 1592.714425] fdb_notify+0x89/0x150 [ 1592.717958] fdb_delete+0x156/0x420 [ 1592.721564] fdb_delete_local+0x516/0x6b0 [ 1592.725705] br_fdb_delete_by_port+0x157/0x1f0 [ 1592.730269] br_dev_delete+0xd9/0x190 [ 1592.734052] br_del_bridge+0xa9/0xe0 [ 1592.737756] br_ioctl_deviceless_stub+0x1ff/0x5f0 [ 1592.742578] ? old_dev_ioctl.isra.0+0x13c0/0x13c0 [ 1592.747411] ? retint_kernel+0x2d/0x2d [ 1592.751293] ? old_dev_ioctl.isra.0+0x13c0/0x13c0 [ 1592.756127] sock_ioctl+0x254/0x450 [ 1592.759734] ? dlci_ioctl_set+0x30/0x30 [ 1592.763688] do_vfs_ioctl+0x75a/0xfe0 [ 1592.767479] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1592.772227] ? ioctl_preallocate+0x1a0/0x1a0 [ 1592.776643] ? security_file_ioctl+0x76/0xb0 [ 1592.781039] ? security_file_ioctl+0x83/0xb0 [ 1592.785426] SyS_ioctl+0x7f/0xb0 [ 1592.788771] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1592.792726] do_syscall_64+0x1d5/0x640 [ 1592.796595] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1592.801762] RIP: 0033:0x45c829 [ 1592.804942] RSP: 002b:00007fef33684c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1592.812630] RAX: ffffffffffffffda RBX: 00000000004f3a60 RCX: 000000000045c829 [ 1592.819891] RDX: 00000000200000c0 RSI: 00000000000089a1 RDI: 0000000000000006 [ 1592.827150] RBP: 000000000078c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1592.834400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1592.841651] R13: 00000000000006ba R14: 00000000004c977c R15: 00007fef336856d4 15:33:55 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1592.935271] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:55 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1593.086207] FAULT_INJECTION: forcing a failure. [ 1593.086207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1593.098042] CPU: 0 PID: 16458 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1593.105922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1593.115314] Call Trace: [ 1593.117904] dump_stack+0x13e/0x194 [ 1593.121563] should_fail.cold+0x10a/0x14b [ 1593.125708] __alloc_pages_nodemask+0x1bf/0x700 [ 1593.130472] ? get_pid_task+0xb8/0x130 [ 1593.134364] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1593.139552] ? find_held_lock+0x2d/0x110 [ 1593.143622] cache_grow_begin+0x7b/0x410 [ 1593.147694] kmem_cache_alloc+0x695/0x770 [ 1593.151838] ? retint_kernel+0x2d/0x2d [ 1593.155718] getname_flags+0xc8/0x560 [ 1593.159507] ? do_sys_open+0x67/0x3f0 [ 1593.163297] do_sys_open+0x1c4/0x3f0 [ 1593.167006] ? filp_open+0x60/0x60 [ 1593.170550] ? SyS_clock_settime+0x1a0/0x1a0 [ 1593.174959] ? do_syscall_64+0x4c/0x640 [ 1593.178934] ? do_sys_open+0x3f0/0x3f0 [ 1593.182817] do_syscall_64+0x1d5/0x640 15:33:56 executing program 1 (fault-call:17 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1593.186716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1593.191942] RIP: 0033:0x45c829 [ 1593.195126] RSP: 002b:00007f79691e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1593.202873] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1593.210147] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1593.217441] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1593.224708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1593.231977] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691e26d4 15:33:56 executing program 0 (fault-call:16 fault-nth:2): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1593.281216] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1593.304425] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ebef8171e16ef9456148df25c3974a7ee52e524119db165a2c8d0000000000"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:56 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:56 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1593.557785] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1593.619367] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1593.619377] FAULT_INJECTION: forcing a failure. [ 1593.619377] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.684431] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1593.776035] CPU: 1 PID: 16502 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1593.783950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1593.793355] Call Trace: [ 1593.795958] dump_stack+0x13e/0x194 [ 1593.799606] should_fail.cold+0x10a/0x14b [ 1593.803786] should_failslab+0xd6/0x130 [ 1593.807862] kmem_cache_alloc+0x2b5/0x770 [ 1593.812021] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1593.817491] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1593.822527] selinux_file_alloc_security+0xaf/0x190 [ 1593.827559] security_file_alloc+0x66/0xa0 [ 1593.831812] ? selinux_is_enabled+0x5/0x50 [ 1593.836062] get_empty_filp+0x15c/0x3e0 [ 1593.840049] path_openat+0x8d/0x3c50 [ 1593.843865] ? finish_task_switch+0x178/0x620 [ 1593.848390] ? lock_downgrade+0x6e0/0x6e0 [ 1593.852543] ? _raw_spin_unlock_irq+0x24/0x80 [ 1593.857045] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1593.862101] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1593.866773] ? finish_task_switch+0x14d/0x620 [ 1593.871273] ? switch_mm_irqs_off+0x5db/0xec0 [ 1593.875772] ? __schedule+0x7c0/0x1ca0 [ 1593.879656] do_filp_open+0x18e/0x250 [ 1593.883461] ? may_open_dev+0xe0/0xe0 [ 1593.887264] ? ___preempt_schedule+0x16/0x18 [ 1593.891681] ? ___preempt_schedule+0x16/0x18 [ 1593.896104] ? __alloc_fd+0x1bf/0x490 [ 1593.899929] do_sys_open+0x29d/0x3f0 [ 1593.903647] ? filp_open+0x60/0x60 [ 1593.907191] ? SyS_clock_settime+0x1a0/0x1a0 [ 1593.911602] ? do_syscall_64+0x4c/0x640 [ 1593.915579] ? do_sys_open+0x3f0/0x3f0 [ 1593.919512] do_syscall_64+0x1d5/0x640 15:33:56 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:56 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:56 executing program 0 (fault-call:16 fault-nth:3): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1593.923409] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1593.928597] RIP: 0033:0x45c829 [ 1593.931783] RSP: 002b:00007f79691c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1593.939517] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1593.946787] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1593.954061] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1593.961337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1593.968607] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691c16d4 15:33:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:56 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:57 executing program 1: prlimit64(0x0, 0x8, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1594.051230] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1594.061924] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1594.075942] FAT-fs (loop0): Filesystem has been set read-only 15:33:57 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.125236] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f00000001c0), 0x1000000000000181, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0xfffff800, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="c3184e2ec40cb1d616fc4ff5dc55ed7a07ce69bfbd508127884d1c31bce58b2302f8b47ec9817eb665f367d3c3a1a9c728c980e466f0f179eec3139409c470bb763d7c91e592c85f49e3739d96346557171e9abbd9fa63"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1594.221288] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.283120] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1594.323214] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1594.349079] FAULT_INJECTION: forcing a failure. [ 1594.349079] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.388162] CPU: 0 PID: 16556 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1594.396245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.405615] Call Trace: [ 1594.408225] dump_stack+0x13e/0x194 [ 1594.411984] should_fail.cold+0x10a/0x14b [ 1594.416356] should_failslab+0xd6/0x130 [ 1594.420349] kmem_cache_alloc+0x2b5/0x770 [ 1594.424612] ? percpu_counter_add_batch+0xee/0x160 [ 1594.429565] selinux_file_alloc_security+0xaf/0x190 [ 1594.434822] security_file_alloc+0x66/0xa0 [ 1594.439073] ? selinux_is_enabled+0x5/0x50 [ 1594.443326] get_empty_filp+0x15c/0x3e0 [ 1594.447314] path_openat+0x8d/0x3c50 [ 1594.451044] ? finish_task_switch+0x178/0x620 [ 1594.455557] ? lock_downgrade+0x6e0/0x6e0 [ 1594.459720] ? _raw_spin_unlock_irq+0x24/0x80 [ 1594.464232] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1594.469261] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1594.474097] ? finish_task_switch+0x14d/0x620 [ 1594.478600] ? switch_mm_irqs_off+0x5db/0xec0 [ 1594.483111] ? __schedule+0x7c0/0x1ca0 [ 1594.487014] do_filp_open+0x18e/0x250 [ 1594.490841] ? may_open_dev+0xe0/0xe0 [ 1594.494748] ? ___preempt_schedule+0x16/0x18 [ 1594.499258] ? ___preempt_schedule+0x16/0x18 [ 1594.503680] ? __alloc_fd+0x1bf/0x490 [ 1594.507496] do_sys_open+0x29d/0x3f0 [ 1594.511225] ? filp_open+0x60/0x60 [ 1594.514793] ? SyS_clock_settime+0x1a0/0x1a0 [ 1594.519458] ? do_syscall_64+0x4c/0x640 [ 1594.523441] ? do_sys_open+0x3f0/0x3f0 [ 1594.527339] do_syscall_64+0x1d5/0x640 [ 1594.531355] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1594.536553] RIP: 0033:0x45c829 [ 1594.539749] RSP: 002b:00007f79691c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1594.547595] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1594.554986] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1594.562375] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.569660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1594.576938] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691c16d4 15:33:57 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.606224] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:57 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.745380] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.825911] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:57 executing program 0 (fault-call:16 fault-nth:4): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:57 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:57 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1594.981890] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x10009, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1595.058480] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1595.066326] FAT-fs (loop0): Filesystem has been set read-only 15:33:58 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1595.147123] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:33:58 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1595.272175] FAULT_INJECTION: forcing a failure. [ 1595.272175] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.369664] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1595.383508] CPU: 0 PID: 16641 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1595.391546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1595.400913] Call Trace: [ 1595.403516] dump_stack+0x13e/0x194 [ 1595.407165] should_fail.cold+0x10a/0x14b [ 1595.411416] ? ext4_sync_fs+0x7e0/0x7e0 [ 1595.415550] should_failslab+0xd6/0x130 [ 1595.419542] ? ext4_sync_fs+0x7e0/0x7e0 [ 1595.423528] kmem_cache_alloc+0x2b5/0x770 [ 1595.427837] ? check_preemption_disabled+0x35/0x240 [ 1595.432870] ? ext4_sync_fs+0x7e0/0x7e0 [ 1595.436854] ext4_alloc_inode+0x19/0x610 [ 1595.440926] ? ext4_sync_fs+0x7e0/0x7e0 [ 1595.444911] alloc_inode+0x5d/0x170 [ 1595.448543] new_inode_pseudo+0x14/0xe0 [ 1595.452527] new_inode+0x1b/0x40 [ 1595.456090] __ext4_new_inode+0x363/0x4e90 [ 1595.460340] ? check_preemption_disabled+0x35/0x240 [ 1595.465367] ? retint_kernel+0x2d/0x2d [ 1595.469272] ? mark_held_locks+0xa6/0xf0 [ 1595.473347] ? retint_kernel+0x2d/0x2d [ 1595.477247] ? ext4_free_inode+0x1480/0x1480 [ 1595.481666] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1595.486703] ? check_preemption_disabled+0x35/0x240 [ 1595.491819] ? retint_kernel+0x2d/0x2d [ 1595.495781] ext4_create+0x1cf/0x4e0 [ 1595.499600] ? ext4_mknod+0x4e0/0x4e0 [ 1595.503427] ? security_inode_create+0xc3/0x100 [ 1595.508106] ? security_inode_create+0xcc/0x100 [ 1595.512874] ? ext4_mknod+0x4e0/0x4e0 [ 1595.516696] lookup_open+0x10e8/0x1750 [ 1595.520603] ? complete_walk+0x1f0/0x1f0 [ 1595.524690] path_openat+0xfc1/0x3c50 [ 1595.528507] ? finish_task_switch+0x14d/0x620 [ 1595.533011] ? switch_mm_irqs_off+0x5db/0xec0 [ 1595.537517] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1595.542203] ? __lock_is_held+0xad/0x140 [ 1595.546401] ? retint_kernel+0x2d/0x2d [ 1595.550392] do_filp_open+0x18e/0x250 [ 1595.554210] ? may_open_dev+0xe0/0xe0 [ 1595.558206] ? lock_downgrade+0x6e0/0x6e0 [ 1595.562367] ? do_raw_spin_unlock+0x164/0x250 [ 1595.566880] ? __alloc_fd+0x1bf/0x490 [ 1595.570810] do_sys_open+0x29d/0x3f0 [ 1595.574538] ? filp_open+0x60/0x60 [ 1595.578151] ? __sanitizer_cov_trace_pc+0x1d/0x50 [ 1595.583005] ? do_sys_open+0x3f0/0x3f0 [ 1595.586907] do_syscall_64+0x1d5/0x640 [ 1595.590815] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1595.596007] RIP: 0033:0x45c829 [ 1595.599200] RSP: 002b:00007f79691e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1595.606915] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 15:33:58 executing program 0 (fault-call:16 fault-nth:5): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:58 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:58 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1595.614193] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1595.621497] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1595.628896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1595.636172] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691e26d4 15:33:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1595.818218] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1595.831851] FAULT_INJECTION: forcing a failure. [ 1595.831851] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.853738] CPU: 0 PID: 16684 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1595.860849] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1595.861647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1595.861660] Call Trace: [ 1595.861677] dump_stack+0x13e/0x194 [ 1595.861696] should_fail.cold+0x10a/0x14b [ 1595.861709] should_failslab+0xd6/0x130 [ 1595.861719] kmem_cache_alloc+0x2b5/0x770 [ 1595.897302] fat_parse_long+0x55f/0xa40 [ 1595.901293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1595.906068] fat_search_long+0x322/0x1050 [ 1595.910307] ? vfat_lookup+0xbb/0x4c0 [ 1595.914121] ? __mutex_lock+0x10d/0x1470 [ 1595.918195] ? fat_parse_short+0x1d20/0x1d20 [ 1595.922616] ? avc_has_perm+0x2bb/0x480 [ 1595.926604] ? avc_has_perm_noaudit+0x400/0x400 [ 1595.931392] ? mutex_trylock+0x1a0/0x1a0 [ 1595.935483] ? security_transition_sid+0xcd/0x120 [ 1595.940339] ? security_transition_sid+0xcb/0x120 [ 1595.945190] ? security_transition_sid+0x9d/0x120 [ 1595.950044] ? selinux_determine_inode_label+0x171/0x320 [ 1595.955501] vfat_find+0xec/0x120 [ 1595.959056] vfat_lookup+0xcc/0x4c0 [ 1595.962729] ? __d_lookup_rcu+0x650/0x650 15:33:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0xa, 0x4080) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7d8c03a97713aed2c06762007f2e1a26b643de0d1979750cd3568c24006f463b7c962d6208f053169f09e410a5c7e1b47c7108394fc4f1fdb27a9757d65e5437192336b55338f9c853eb0cdf765038382515bb708accd15a056369046f1560c08470c14c3ed87708097e01ef11a8653f0419f6133dce45e5e1031ecefc286eab9779671ea41c817e70f6ecc5add666860cd6ff2a6de5a5fcc053b8695a714241bf97845292d4df2bd685cac914591c2abf477d5c6bc5b79d03ac04900844b9a3f5ced1e15bab579b4a70215"], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x730292}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1595.967019] ? vfat_unlink+0x2b0/0x2b0 [ 1595.970923] ? security_inode_permission+0xb7/0xf0 [ 1595.975869] ? security_inode_create+0xcc/0x100 [ 1595.980693] ? vfat_unlink+0x2b0/0x2b0 [ 1595.984595] lookup_open+0x5d1/0x1750 [ 1595.988520] ? complete_walk+0x1f0/0x1f0 [ 1595.992625] path_openat+0xfc1/0x3c50 [ 1595.996445] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1596.001127] ? __lock_is_held+0xad/0x140 [ 1596.005215] do_filp_open+0x18e/0x250 [ 1596.009175] ? may_open_dev+0xe0/0xe0 [ 1596.013029] ? lock_downgrade+0x6e0/0x6e0 [ 1596.017186] ? do_raw_spin_unlock+0x164/0x250 [ 1596.021804] ? __alloc_fd+0x1bf/0x490 [ 1596.025708] do_sys_open+0x29d/0x3f0 [ 1596.029431] ? filp_open+0x60/0x60 [ 1596.032985] ? SyS_clock_settime+0x1a0/0x1a0 [ 1596.037931] ? do_syscall_64+0x4c/0x640 [ 1596.041911] ? do_sys_open+0x3f0/0x3f0 [ 1596.045805] do_syscall_64+0x1d5/0x640 [ 1596.049709] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1596.055021] RIP: 0033:0x45c829 [ 1596.058353] RSP: 002b:00007f79691c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1596.066070] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1596.073416] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1596.080702] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.088059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1596.095419] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691c16d4 15:33:59 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:59 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x101, 0x5, 0xfffffffffffffffe, 0x0, 0x6d72428e, 0x0, 0xfffffffb}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000002c0)="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", 0x100}, {&(0x7f0000000180)="c04c41ac168f4746cd89c3ee55fc86242ccbdc30c737215229df4bb25c32d516dd104876ea22309ea1297f0fe7de1e5d72f1f1", 0x33}, {&(0x7f0000001740)="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"/4094, 0xffe}, {&(0x7f00000003c0)="4c844e11d04bb053d7421761d205e77f9de98f02ea9c5777dbb0d080d5345eecbe77b8c5a233ff9e38cea12b570213cf23c2c95ced9ed55ad9243f2c68a14a91ece89a0355bc9aa974c6733f712a3411c7fb722c668afd30520a63602dc802cca117d183dc4d93135bcc078ac359ad6f0bcf95571c967955c2ed38f714a6f7", 0x7f}], 0x4, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:33:59 executing program 0 (fault-call:16 fault-nth:6): timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:33:59 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1596.374736] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1596.400409] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1596.412865] FAT-fs (loop0): Filesystem has been set read-only 15:33:59 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:59 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:33:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:33:59 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1596.544571] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) [ 1596.581513] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1596.673716] FAULT_INJECTION: forcing a failure. [ 1596.673716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1596.685737] CPU: 1 PID: 16742 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1596.693790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.703427] Call Trace: [ 1596.706046] dump_stack+0x13e/0x194 [ 1596.710268] should_fail.cold+0x10a/0x14b [ 1596.714438] __alloc_pages_nodemask+0x1bf/0x700 [ 1596.719128] ? save_trace+0x290/0x290 [ 1596.723075] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1596.728119] cache_grow_begin+0x7b/0x410 [ 1596.732197] kmem_cache_alloc+0x695/0x770 [ 1596.736358] ? check_preemption_disabled+0x35/0x240 [ 1596.741389] fat_parse_long+0x55f/0xa40 [ 1596.746746] fat_search_long+0x322/0x1050 [ 1596.751862] ? vfat_lookup+0xbb/0x4c0 [ 1596.755999] ? fat_parse_short+0x1d20/0x1d20 [ 1596.760426] ? mark_held_locks+0xa6/0xf0 [ 1596.764509] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1596.769544] ? mutex_trylock+0x1a0/0x1a0 [ 1596.773622] ? check_preemption_disabled+0x35/0x240 [ 1596.778749] ? retint_kernel+0x2d/0x2d [ 1596.782847] vfat_find+0xec/0x120 [ 1596.786318] vfat_lookup+0xcc/0x4c0 [ 1596.789966] ? vfat_unlink+0x2b0/0x2b0 [ 1596.793872] ? may_create+0x1d1/0x3a0 [ 1596.797683] ? security_inode_create+0x7f/0x100 [ 1596.798057] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1596.802486] ? security_inode_create+0xcc/0x100 [ 1596.802499] ? vfat_unlink+0x2b0/0x2b0 [ 1596.802510] lookup_open+0x5d1/0x1750 [ 1596.802533] ? complete_walk+0x1f0/0x1f0 [ 1596.802553] path_openat+0xfc1/0x3c50 [ 1596.802573] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1596.835454] ? __lock_is_held+0xad/0x140 [ 1596.839528] ? check_preemption_disabled+0x35/0x240 [ 1596.844555] do_filp_open+0x18e/0x250 [ 1596.848374] ? may_open_dev+0xe0/0xe0 [ 1596.852715] ? lock_downgrade+0x6e0/0x6e0 [ 1596.856880] ? do_raw_spin_unlock+0x164/0x250 [ 1596.861679] ? __alloc_fd+0x1bf/0x490 [ 1596.865488] do_sys_open+0x29d/0x3f0 [ 1596.869212] ? filp_open+0x60/0x60 15:33:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="a5373fd1680f0f"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1596.872751] ? SyS_clock_settime+0x1a0/0x1a0 [ 1596.877245] ? do_syscall_64+0x4c/0x640 [ 1596.881230] ? do_sys_open+0x3f0/0x3f0 [ 1596.885493] do_syscall_64+0x1d5/0x640 [ 1596.889470] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1596.894667] RIP: 0033:0x45c829 [ 1596.897862] RSP: 002b:00007f79691c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1596.905582] RAX: ffffffffffffffda RBX: 00000000004f6a20 RCX: 000000000045c829 [ 1596.912882] RDX: 0000000000000000 RSI: 0000000000060042 RDI: 0000000020000040 [ 1596.920173] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.927776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1596.935624] R13: 0000000000000779 R14: 00000000005253ff R15: 00007f79691c16d4 15:33:59 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:33:59 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug'}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004600)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/99, 0x63}, {}, {&(0x7f00000001c0)=""/21, 0x15}, {&(0x7f0000000340)=""/179, 0xb3}, {&(0x7f0000000400)=""/255, 0xff}], 0x5, &(0x7f000001d800)=""/115, 0x73}, 0x8000}, {{&(0x7f00000007c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000e80)=""/5, 0x5}, {&(0x7f0000000580)=""/10, 0xa}, {&(0x7f0000000940)=""/104, 0x68}, {&(0x7f00000009c0)=""/160, 0xa0}], 0x5}, 0x8}, {{&(0x7f0000000b00)=@tipc, 0x80, &(0x7f0000001080)=[{&(0x7f0000000b80)=""/179, 0xb3}, {&(0x7f0000000c40)=""/16, 0x10}, {&(0x7f0000000c80)=""/140, 0x8c}, {&(0x7f0000000d40)=""/89, 0x59}, {&(0x7f0000000dc0)=""/185, 0xb9}, {&(0x7f0000004800)=""/102389, 0x18ff5}, {&(0x7f0000000ec0)=""/171, 0xab}, {&(0x7f0000000f80)=""/210, 0xd2}], 0x8, &(0x7f0000001100)=""/26, 0x1a}, 0x4}, {{0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000001140)=""/233, 0xe9}, {&(0x7f0000001240)=""/2, 0x2}, {&(0x7f0000001280)=""/225, 0xe1}, {&(0x7f0000001380)=""/61, 0x3d}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x7, &(0x7f0000004440)=""/247, 0xf7}, 0xf9c}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000004540)=""/125, 0x7d}, {&(0x7f0000004740)=""/162, 0xa2}], 0x2}, 0x5}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f000001d880)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r2, 0xe13d0000) [ 1597.225030] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:00 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:00 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x4041, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1597.268181] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:00 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:00 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1597.411189] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1597.416451] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1597.459799] FAT-fs (loop0): Filesystem has been set read-only 15:34:00 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1597.541851] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1597.555827] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:00 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:00 executing program 0: timerfd_create(0x9, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) write$vhost_msg(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000280)=""/209, 0xd1, &(0x7f0000000080)=""/38, 0x1, 0x2}}, 0x48) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="000100"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1597.698542] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1597.724406] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="e2961b413d5c050505950b78ea40551ed5fb665125b38dec49f6b01e77bac1b627be90756dadb7d89811dc2f35"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:00 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="a5373fd1680f0f"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1597.766989] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1597.927854] audit: type=1804 audit(1588865640.797:661): pid=16845 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1819/file0" dev="sda1" ino=16603 res=1 [ 1597.964275] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1598.047485] audit: type=1804 audit(1588865640.867:662): pid=16845 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1819/file0" dev="sda1" ino=16603 res=1 15:34:01 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x2, 0x100000001, 0x0, 0x10000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:01 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000180)=0x7fff) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f00000001c0)={0xf3, 0x3}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x1e000, 0x0, 0x0, 0x0, 0x0, 0x4d5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1598.389363] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) [ 1598.409830] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:01 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:01 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1598.623790] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(r4, 0x0, &(0x7f0000000640)=ANY=[], 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="a5373fd1680f0f"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1598.747805] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:01 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1599.110461] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, 0x0) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:02 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1599.335739] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='vfat\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r2}, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1599.438618] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1599.470319] FAT-fs (loop0): Filesystem has been set read-only 15:34:02 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1599.531344] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:02 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1599.705716] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1599.789445] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1599.833556] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 5: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x4041, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1599.985523] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x78, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1a11}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x800) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000), 0x0, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x3c, 0x0, 0x3, 0x0, 0x0, 0x10000}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @private=0xa010100}, 0xfffffffc, 0x0, 0x1000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:02 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34f7d79a5506be659f8e2c6abca3cd4a24fc0ff0abb659f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:03 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1600.254775] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1600.449442] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="515756acd7d98234845cdc40a123a4fcd6200171f53b322dd4c6094da43fedb8c85cd59ab56588a7cb405b40cf03ba1d20140ab806f27bfda6918a62d212660c5c4a71ffe742e122dbe7c3718b805bd7ee161481bade9099687a1a6f8688306deb2fbf1c2526bc9005c4d6b6084605a205cb780fa4d3d2acb160ebbe23ada6525fd265e5e744c463777000"/150], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:03 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:03 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000141"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000e00)=[{{&(0x7f0000000140)=@l2tp, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/64, 0x40}], 0x1}, 0x6}, {{&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000f00)=""/102400, 0x19000}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000480)=""/128, 0x80}, {&(0x7f0000000500)}, {&(0x7f0000000640)=""/214, 0xd6}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000540)=""/45, 0x2d}], 0x7, &(0x7f00000008c0)=""/115, 0x73}, 0x5}, {{&(0x7f0000000940)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000009c0)=""/202, 0xca}], 0x2, &(0x7f0000000b00)=""/74, 0x4a}, 0x9}, {{&(0x7f0000000b80)=@hci, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)=""/41, 0x29}, {&(0x7f0000000c40)=""/149, 0x95}, {&(0x7f0000000d00)=""/103, 0x67}], 0x3, &(0x7f0000000340)=""/46, 0x2e}, 0xffff8001}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x2, 0x0, 0x3, 0x800000000000000}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast1, 0x0, 0xffff, 0x0, 0x500}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:03 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1601.006803] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1601.041725] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000641a) [ 1601.062968] FAT-fs (loop0): Filesystem has been set read-only 15:34:04 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1601.139006] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:04 executing program 5 (fault-call:5 fault-nth:0): r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1601.361660] FAULT_INJECTION: forcing a failure. [ 1601.361660] name failslab, interval 1, probability 0, space 0, times 0 [ 1601.391585] CPU: 0 PID: 17120 Comm: syz-executor.5 Not tainted 4.14.179-syzkaller #0 [ 1601.402181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1601.411968] Call Trace: [ 1601.414938] dump_stack+0x13e/0x194 [ 1601.419483] should_fail.cold+0x10a/0x14b [ 1601.423922] ? finish_task_switch+0x178/0x620 [ 1601.428520] should_failslab+0xd6/0x130 [ 1601.432769] kmem_cache_alloc_trace+0x47/0x7b0 [ 1601.438020] ? lock_acquire+0x170/0x3f0 [ 1601.441497] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1601.443436] ? bdi_split_work_to_wbs+0xaa/0xd30 [ 1601.458198] ? check_preemption_disabled+0x35/0x240 [ 1601.463796] bdi_split_work_to_wbs+0x3d2/0xd30 [ 1601.471910] ? locked_inode_to_wb_and_lock_list+0x7e0/0x7e0 [ 1601.480756] ? rwsem_down_read_failed+0x1f6/0x390 [ 1601.485612] ? rwsem_down_write_failed_killable+0xd90/0xd90 [ 1601.496846] __writeback_inodes_sb_nr+0x15b/0x1d0 [ 1601.505996] ? bdi_split_work_to_wbs+0xd30/0xd30 [ 1601.510896] ? _find_next_bit+0xdb/0x100 [ 1601.515653] sync_filesystem+0x8c/0x230 [ 1601.520590] fsync_bdev+0x8f/0xd0 [ 1601.524239] invalidate_partition+0x31/0x60 [ 1601.528694] rescan_partitions+0xde/0x850 [ 1601.534233] ? __lock_is_held+0xad/0x140 [ 1601.538719] __blkdev_reread_part+0x157/0x1e0 [ 1601.544523] blkdev_reread_part+0x23/0x40 [ 1601.550984] loop_reread_partitions+0x72/0x80 [ 1601.556040] loop_set_status+0xbfc/0x11f0 [ 1601.561100] loop_set_status_old+0x1f5/0x2c0 [ 1601.566774] ? loop_set_status_compat+0xd0/0xd0 [ 1601.571483] ? _raw_spin_unlock+0x29/0x40 [ 1601.575835] ? __mutex_lock+0x36a/0x1470 [ 1601.580219] ? security_capable+0x88/0xb0 [ 1601.584765] ? ns_capable_common+0x127/0x150 [ 1601.590391] lo_ioctl+0x9b2/0x1c40 [ 1601.594024] ? loop_probe+0x160/0x160 [ 1601.597927] blkdev_ioctl+0x91d/0x17d0 [ 1601.602246] ? blkpg_ioctl+0x8e0/0x8e0 [ 1601.606220] ? trace_hardirqs_on+0x10/0x10 [ 1601.610483] block_ioctl+0xd9/0x120 [ 1601.614375] ? blkdev_fallocate+0x3a0/0x3a0 [ 1601.618952] do_vfs_ioctl+0x75a/0xfe0 [ 1601.622750] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1601.627620] ? ioctl_preallocate+0x1a0/0x1a0 [ 1601.632045] ? security_file_ioctl+0x76/0xb0 [ 1601.636881] ? security_file_ioctl+0x83/0xb0 [ 1601.641788] SyS_ioctl+0x7f/0xb0 [ 1601.645150] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1601.650159] do_syscall_64+0x1d5/0x640 [ 1601.654057] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1601.659783] RIP: 0033:0x45c829 15:34:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4000000000000003) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="29a343dc062754f4b3e4000000b3569f020bc21b15b93f1ec4b030cec9f9df60d8df6fc8a7ff106628b0fb1cb79df8cb8b9dd688b9114a34db65e4a154f93d94ca37956775836a8a119098268ab9ed6848b4b8e34dcbbc7f0c0a20ae75bbda19a4f7acd5af1766e2f691c032bc9424e878dd7fa09a473ee1704b6921ee2e0d33f73470b522615f14bed6e4b7"], 0x2, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1601.663119] RSP: 002b:00007fa9c0c96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1601.671264] RAX: ffffffffffffffda RBX: 00000000004e8ae0 RCX: 000000000045c829 [ 1601.679358] RDX: 0000000020000440 RSI: 0000000000004c02 RDI: 0000000000000003 [ 1601.686678] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1601.693952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1601.701346] R13: 00000000000003fc R14: 00000000004c6947 R15: 00007fa9c0c976d4 [ 1601.719640] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) 15:34:04 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:04 executing program 5 (fault-call:5 fault-nth:1): r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1601.919725] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:05 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:05 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0xc) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1602.255959] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:05 executing program 0: timerfd_create(0x5, 0x800) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = gettid() tkill(r1, 0x40) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="66197589bdb58a15ac9e8d73"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:05 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:05 executing program 5: r0 = creat(0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x218, 0xc8, 0xffffffff, 0xffffffff, 0xc8, 0xffffffff, 0x180, 0xffffffff, 0xffffffff, 0x180, 0xffffffff, 0x3, &(0x7f0000000080), {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0xff000000, 0xff000000, 'team_slave_0\x00', 'team_slave_0\x00', {0x7f}, {0xff}, 0x67, 0x2, 0x2}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x1000, 0x2], 0x1}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1ca1c5af, 0x6}}}, {{@ip={@remote, @empty, 0xff000000, 0xffffffff, 'veth0_to_hsr\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0x29, 0x1, 0x1}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x7, 0x6, 0x6, '\x00', {0x20000}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x33, 0x1}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x32, 0x0, 0x4, 0x0, 0x0, 0x5d5, 0x75}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7dee7a1974bde5d83c79ba2338fef0425b41cbbff9617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765a9d1535f0c5e9feb633b051f1f085f42a735ed120e330de77460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f878719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@mcast2}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:05 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1602.645684] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1602.659382] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1602.680519] FAT-fs (loop0): Filesystem has been set read-only 15:34:05 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200f0ffffc10400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:05 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000140)) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x2, 0xc, 0x1d, "c15bf01f087d9b6b2b4efaeccc1af741019a72b427e00bbc53ff7f0000cea5ee418ce7849ff32e33ea3fef495b9dfa6d883c93f4bed6f4cc492689ec6c293f43", "2afecca7cc61acea23c4f3200050d96f78bb539b433f00", [0x8000000000000000]}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:06 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1603.059205] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:06 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f5}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@euid_gt={'euid>'}}]}}) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1603.243263] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:06 executing program 0: timerfd_create(0x9, 0x0) get_thread_area(&(0x7f0000000500)={0x6, 0x100000, 0x1000, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e000, 0x3, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}, {&(0x7f0000000280)="86082bfb62c88983cd79d4ab2fe4859375861933bf78c7fbe6a32cee2af1b9a4a8ffbd01886431949d5013adadb545f55b777e5a1f09ca27d889a7349155321dfc5842cd11bebb93b44ad366db3e2cfae224783f471c68dd8edb59de2f92aed0ec9bceadb13066c914228a616671e9ea8c1fba3176c6f2375793b3bfcccb884ec4255c3e7a5a41b677595243e742d361e06ac656ad00cbb1568c682b68fab9be79960df52f94f1e9580c14bddb6b7c13fd35aebf3ad69a960b47fd983e9f02baf2fa81b4db962b28e41ac906e16a44f949d223905c551e1dad67439eb6b84a918a00e36d15d174f7c791517099c5300edc801c", 0xf3, 0x8}, {&(0x7f0000000440)="4c9926c12d8ee33f77ab0df5fcfb6205f62bb5f7a590ac6923c7347df05d31ca27094b279c84f1c570d5018a1734038b03e275f5393097c73c331189897de934c3014926b5ee2bdb7253d2f43e5d417d9206fc852d740faf6a4772c329e5dc71e947d68d67ee39e3e25c62336b5f19cc53bb917b14bcd538d277fa0f70ad2cefbbfe8459c13ad32af0a9a3bf53ac78f4a3a7b5d1a8544dba1b39c46d8a204b7a5780572283b46e06", 0xa8, 0x9}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x208000, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) getsockopt(r0, 0x7, 0x1f, &(0x7f0000000000)=""/23, &(0x7f0000000080)=0x17) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="6702b8d10000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:06 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1603.310292] audit: type=1804 audit(1588865646.177:663): pid=17284 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1824/file0" dev="sda1" ino=17312 res=1 [ 1603.410462] FAT-fs (loop0): bogus logical sector size 49446 [ 1603.423717] FAT-fs (loop0): Can't find a valid FAT filesystem 15:34:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000240)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="aac315c8ab8a4624b7ed5051d12efaa5a9b15834bd69cd3d40aa72158d6185bd0e806e28745af38d194119f0e4141be489da003defce48a039a2a58c3826667a60bce73aa669f5394d0e02c6a451de9ed1c566ed12732c55e2aeeef015dffee77d41b23586a0dc5e85883d04b4fa7a6c0775afbba85384294ee54a45dff7d3ae3e77d22e5cbbfd54f2072891789fa45b1168401c0852ddf113411149a7d6805f6ce3e69dd582e2fb0836f8b4429db33063469f"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1e}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@mcast1, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:06 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000540)=ANY=[@ANYBLOB="7472616e733d04697274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b667368617406000000643eaa6b11dc5f8d2b248bebdc24c718db41aba6e0a92b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ptrace$peekuser(0x3, 0xffffffffffffffff, 0xfffffffffffffd0e) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x20, 0x3, 0x6}}, 0x14) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r3, 0x40081271, &(0x7f0000000040)) prlimit64(r1, 0x0, &(0x7f0000000400)={0x2, 0x8001}, &(0x7f0000000500)) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) r5 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x9, 0x3, 0x4, 0x200000, 0x1, {}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r5}) fstatfs(r5, &(0x7f0000000300)=""/195) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1603.568436] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:06 executing program 0: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x20c00) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./bus\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="4b20bcbc923a5bdb2ca30efe3f9c68b4ca4f1db151840fb36de72c361f2834fde7efa4ac8f872cf780003e6a1ee033be831c66d9e746b0fda0ab8a93af199079c7b8bfceec8517b5f2ade4a9bb1fb35509d2bcbaf040d60db3236e54456d5432d1979a467b0bc43ec713f192788e514d48f8570d812bce3797c7b03d43203cdcf8ffa212904f71211512238c71b0f1c40c51d1e1a1419a936abc682e4f2089f68d69b5dba7f7066b3d38a03f54fb4e1777f3"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60202, 0x85) 15:34:06 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1603.996950] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:07 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000080)) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB="6702000000c63559151d1c29e5ce378c6d0929001f0400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:07 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1604.054209] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:07 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r1, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="0907000000000000000001"], 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x6c, r2, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x40, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @dev={[], 0x19}}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @dev={[], 0x1d}}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xe, 0x1, "c7a8da08910ae0fadea5"}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xfffffffa}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x40}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x804}, 0x5) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) r4 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r4}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000400)=0x10) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1604.243630] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:07 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1604.406971] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000001c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="b6004238c751e4e98d40c9d2d5a6d87ed82ff4ff0000001100bc07000000000000"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0x92c5, 0x0, 0x1000, 0xc0000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:07 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1604.521573] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:07 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1228002, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x4000020, 0x1, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f", [0xfffffffffffffffd]}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x0, 0xe7, 0x8, 0x0, 0x0, 0xffffffff, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/159, 0x9f}], 0x3}, 0x101}, {{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)=""/109, 0x6d}, 0x5}, {{&(0x7f0000000540)=@alg, 0x80, &(0x7f0000003880)=[{&(0x7f0000003640)=""/81, 0x51}, {&(0x7f00000036c0)=""/141, 0x8d}, {&(0x7f0000003780)=""/214, 0xd6}], 0x3, &(0x7f0000003a00)=""/87, 0x57}, 0x7}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="4f5b61b24563b95627f4a5e442a183b7087364000d4acb90e7c37b75ae7e2d7d2809717bc489b7d058a55d4ec4baba"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1604.814798] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:07 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:07 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0xffff596b, 0x82b0, 0x8, 0xfffffffe}}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0xfff) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1605.063387] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value [ 1605.169854] audit: type=1804 audit(1588865648.037:664): pid=17456 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1827/file0/file0" dev="loop0" ino=4847 res=1 [ 1605.238999] audit: type=1804 audit(1588865648.037:665): pid=17461 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1827/file0/file0" dev="loop0" ino=4847 res=1 15:34:08 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c2e6d7319b01"], 0x18) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffb41}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:08 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e73194f47a3e17130303030303030303030304b3466382c736d61636b66736861743d736d451dfb5bc1a38a61636b6673686100"/65, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:08 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506b00000000c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba31617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1605.641962] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:08 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ac2d5d66b0b8c80a87e5d1698d769a7fe7a63617daf2276b178ff35ac656e942340d3dfd9a68129898aa0382f09b935cf5e2d0f98523f6061bcbc35ff7a64136d8daad66f0277fe6662bf69b337074061b32bac10a65ef541c18ae4437f154ba96aa2d7279bb4c15eedbdcc604258cf4678e76f92f1bd8a5a3c756e0ed946daa5b8a1617f0c1465a73efcb6c1cda45627bd2d7323acd5c481ce30e05200ce877764e32369464938686329bfc571dd1fc58ad46abdba6899e936f67f0be47c06988108e1e5eb0665e6c5eeb56513be3"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:08 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000500)="683c1c8f7deabf3f73ad0b50398e469b3e5502a9d60163b58526699077343c146b5b6d44654f5adce64f1ce2b903f6d570c565f8a60264ccc5700555b4f68ddca7938e1d7cb06f856bbc34c4f022d78f3a7571107520e6a5529a5e6f63379322afa7d5bbd61bcab24a1687cabc1fcf7998dbaa30487b8c6e6eb8b5ffde0bf2406c6030b1825473f221962db6e4581e811db88cd6ea809020b2296c826ffa502e5523617ecfa63d35b3aad9cfab10fdc44e4dd7f5504458a4fd0514d59fd4eda4c02d0f8d9a469d7c05d887f3384bc230e6d53772cb074e51da7970583cbfe92fc21a9ae2846175e24349f54b469a687d0551fc9bc905f65782c87c4f", 0xfc, 0x6}, {&(0x7f0000000380)="2ad8089e00c1c545aa4c9773706e938c62de9dc7ad0138dc822f742ced8abc12d5cc0d558412c41435c02621757e4c62ee99274e079acb24f07b8926aaa42c722be715563bc714d7c4993d6563ef04dc2163ce785f66f7ba328fda90075fa7562d2574d9763da23aadf210821ac3f60097e05884628ccf7fe40e544c146e38b5e23008bb7ccd282757b6c0063c7c517fd462b6783e", 0x95, 0x9}, {&(0x7f0000000600)="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", 0xfc, 0xfb76}], 0x4000, &(0x7f0000000700)={[{@rodir='rodir'}, {@shortname_mixed='shortname=mixed'}, {@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}], [{@obj_user={'obj_user', 0x3d, '/dev/loop#\x00'}}]}) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="adb4c139dc20280a8dc03217ecc39f"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x20, 0x1409, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x20000000) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1605.867290] audit: type=1804 audit(1588865648.737:666): pid=17507 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1828/file0" dev="sda1" ino=16608 res=1 [ 1605.970430] FAT-fs (loop5): Unrecognized mount option "obj_user=/dev/loop#" or missing value 15:34:08 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1606.073121] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:09 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:09 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x48000, 0x0) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000140)=0x6e) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1606.202313] FAT-fs (loop5): Unrecognized mount option "obj_user=/dev/loop#" or missing value 15:34:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@loopback, @ipv4={[], [], @loopback}, @mcast1, 0x1}) mmap(&(0x7f0000950000/0x1000)=nil, 0x1000, 0x0, 0x9a25940c6c0c8eb9, 0xffffffffffffffff, 0x0) [ 1606.341920] audit: type=1804 audit(1588865649.207:667): pid=17556 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1829/file0" dev="sda1" ino=17316 res=1 [ 1606.348096] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:09 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x30, 0x75, 0x5, 0x7ffe, 0x4000ff95, 0x10000, 0x5bc, 0xfffffffc}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7a15c365d6eac2ed5b8cacc44b6e026931f08e03561476683cf1aadf7755ea96c8bdf674642169cd724d9d385e02a2a51f9fb3f29c1bcb8f9aed000d4efbeab02d9469dd09be0f80191ddcc2346c7ba87ba742e6d4beeeac003b31b1cc014d677fc31389e3c72cbe00b8fd663194c23a467333d44e46df7d4723eac75cae92f67d9598fb293b44ab344fd042de5d6a5dae4b0d99a4f806a2524c642e333258779dd58216fb2eb1e9f4bba9909f0a3e010ad53207392667cef28818188c744faaca4da466748a5a2374c586f2253bb272ee063709d698ee9f6fc2c5782"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:09 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1606.732120] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:09 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x1}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r4, r5) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$KEYCTL_MOVE(0x1e, 0x0, r7, 0xffffffffffffffff, 0x1) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:09 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1606.885576] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:09 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x8000, 0x1, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) socket$can_raw(0x1d, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1607.058013] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:10 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b66736861742c657569643eb1e163c7a0b854d6188f742b693d4f2fe5c0d5b91ed8458be0b8c8b17139fe97c51bce0d0a56b52b4162372fcbe6db3f21d546436d9088c958260056df07954b46ef57f780e8f278a2548f5040be800ff2c2d69aaba00298e1774dc0ca14a28f74da1ac88cfec204b611345888a7dcc01aca193a5294124804cfb8496b33309d8a558037", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fc4e3efc0302699c57c0a1a76000594df4ca5506be6b0f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2bf080ed02561e4d88da3e9ac84d9777e02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2b36a6e50017ac10b1731937edc2a8fbdaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1607.243046] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:10 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000080)={0x0, {0x3f, 0x6}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1607.434937] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:10 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r2, 0x10, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x401, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40090}, 0x4000090) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1607.646645] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x8) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1607.738361] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:10 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275673d307830303030303030303030303031346d61636b66736861742c6575ce643e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0xf165, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000380)={0xe2, 0x2, 0x4, 0xe000, 0xffffffff, {}, {0x3, 0xc, 0x7, 0x80, 0x2, 0xb5, "ccf1ea9f"}, 0x0, 0x1, @offset=0x8, 0x400, 0x0, r1}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x28, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af7419940723427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a456c293f5300", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f", [0xffffffffffffff61]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x8200, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)=0x0) fcntl$lock(r3, 0x24, &(0x7f0000000340)={0x1, 0x3, 0x7, 0x8001, r4}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1607.888719] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:10 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000140)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8000) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0xfffc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/375], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:11 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2da1acbfda696d2f9846a90719817b6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107531959b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaa03d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bee939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e3552e2f4af0ae78b1004daf39880fb82234c3d240e0f659380bab85a3af03a710d521138ec5f365c7880a19e8d5cf6af081d240db2c5ed332b3e4f41e8741200155b9264733bc735e9385c321dc34ce1ea2adc5c60085287199f78b02883cb0e2a36f56f865c73a782405f319b50d179683136ea526e62e9a02cf438d1fd2e6711682c278ce3c73dafcce8a7a731a74fe933d5d023d73cc6a55c782627c0360f938cb2d06700ed864c814a01c2143bcbc5cfeb00000000000000000000001b86548011800cfdd587ec7ccfb00a68e09805667943f603e4dc0819f70e3a2305000000000300"/488], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1609.304209] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) [ 1609.492837] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}]}) [ 1609.638040] jfs: Unrecognized mount option "smackfshat=ppp0^eth0" or missing value 15:34:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}]}) 15:34:12 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}]}) 15:34:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2da1acbfda696d2f9846a90719817b6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107531959b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaa03d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bee939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e3552e2f4af0ae78b1004daf39880fb82234c3d240e0f659380bab85a3af03a710d521138ec5f365c7880a19e8d5cf6af081d240db2c5ed332b3e4f41e8741200155b9264733bc735e9385c321dc34ce1ea2adc5c60085287199f78b02883cb0e2a36f56f865c73a782405f319b50d179683136ea526e62e9a02cf438d1fd2e6711682c278ce3c73dafcce8a7a731a74fe933d5d023d73cc6a55c782627c0360f938cb2d06700ed864c814a01c2143bcbc5cfeb00000000000000000000001b86548011800cfdd587ec7ccfb00a68e09805667943f603e4dc0819f70e3a2305000000000300"/488], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/163, 0xa3}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f0000000380)=""/103, 0x67}, {&(0x7f00000001c0)=""/36, 0x24}, {&(0x7f0000000400)=""/154, 0x9a}, {&(0x7f0000000240)=""/50, 0x32}, {&(0x7f00000004c0)=""/132, 0x84}], 0x7, &(0x7f00000006c0)=""/237, 0xed}, 0x9}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x6, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/10], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x11, 0xffffffffffffffff, 0x2000) 15:34:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:13 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) keyctl$chown(0x4, r4, r2, r3) lchown(&(0x7f00000003c0)='./file1\x00', 0x0, r3) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r5}) r6 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r6, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x30}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}]}, 0x3c}}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x68, r6, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}]}, 0x68}}, 0x48810) 15:34:13 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}]}) 15:34:14 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ee7471000000000000000000"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:14 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>', r1}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)=0x3ff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'macroman'}}], [{@smackfshat={'smackfshat', 0x3d, 'ppp0^eth0'}}]}) 15:34:14 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000140)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ac2d5d66b0b8c80a87e5d1698d769a7fe7a63617daf2276b178ff35ac656e942340d3dfd9a68129898aa0382f09b935cf5e2d0f98523f6061bcbc35ff7a64136d8daad66f0277fe6662bf69b337074061b32bac10a65ef541c18ae4437f154ba96aa2d7279bb4c15eedbdcc604258cf4678e76f92f1bd8a5a3c756e0ed946daa5b8a1617f0c1465a73efcb6c1cda45627bd2d7323acd5c481ce30e05200ce877764e32369464938686329bfc571dd1fc58ad46abdba6899e936f67f0be47c06988108e1e5eb0665e6c5eeb56513be3"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:14 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x80000001, 0x200801) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:14 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d7669f274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b667368617403000000643e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x39, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x2, 0x3, 0xfffffffffffffffc}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:14 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="c8fd46ff1b8f06efc2b5d91337bde9c2832339753e7b83620670370f460d47da08db398946e202fb1d201e85a217cb359b5a07a200ba57679ae2b4c03d080613fd8a5817d1dbe22450798fff3be501c1090000000000000071a70a04f702ec000000005b58d502a68c4d21c586a7ec54617e0e19469a3f45bde42bc1cefc1ff853171666ff2b79e2243669d01ce047fd9973a87566063e0b11e1db481d4550c5aa29577441bfcef4c5a9551a1422cd2838b0fffd5e47c3253628a95743ecac0d7306444da6ebd4d8d38d161edc272af808d28188a868efc83f17b53b1f9890c6"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcsa\x00', 0x165643, 0x0) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000400)=0x3ff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x4000000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0xdc, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) sendmsg$inet6(r2, &(0x7f0000000200)={&(0x7f0000000080)={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, 0x1c, &(0x7f0000000140), 0x1, 0x0, 0x5f}, 0x4090) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x1e, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x2000, 0x0) connect$x25(r5, &(0x7f0000000380)={0x9, @remote={[], 0x2}}, 0x12) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r4, 0xc01064c8, &(0x7f0000000300)={0x1, 0x0, &(0x7f0000000240)=[0x0]}) 15:34:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000440)=[{&(0x7f0000000500)}, {&(0x7f00000004c0)="c6e9fc2fa21e170a33abfdee4c46fbdec54db8df0a994e20ba38cce3fe93404f8bbeea8efda6fea3e8a15d45f0ebd9d51915d9133b28aef98c4ab6f932e49d4cfd0b0783c9dc9708b32c23f2423e21c55c46f48260a182704affd71328a98a367ce691d0e2995ca2ee4262ad29f604c25a714ca90665ed7f5858d420e8e5fa25de04d85aef66a8eb145a32d8700e575ebff0e49f6603ed8c64c9b9525656d3524bc6d9628ff81c7879f755d3796bd25b73ea2f73f2e78972095b746a0f63dd0b05931f6b3d6408ed8cc05e469e88b9b1be"}, {&(0x7f00000002c0)="3760ca15da1ec502d4a23a59d0fc8c6d48b5700805785e8a26a3e124c0a3f9dc377051f73b11bd115014449171c0f79120795c5710f6d7eb41e0facb9bfa36362e5c3efe54f5dd6a2e67c131a013c088f5685daed760e5fa449bde106b31a23b8f94df7bab62add7c2cff791f8630c8ac188665c88cb952633d226ddb115b7ad600aff4af97f15faf6f3cf2925", 0x8d}, {&(0x7f0000000640)="3b5526cb9f0e06fccc1458d45e4e758e2896122c4df634e67ed86bc3e861522173501271734a7a2ebf5f1015491b95163dae8698b3b3280b54d7b1ac73595635709132007cc7d5d96008e8a2dc64370bec5cf4f7d34ffb23235746321781cff15c4c5321ab53d94848bdc1a6ed078723a015425d44c33d4c0a255503d68ce7b2ce9919d212dec420df3b398e0b12d34bec636e72eb42b24815f1373c1791b208842dad86443b7c2f22b46f", 0xab}, {&(0x7f0000000180)="f96c6aff246fd4b3580df519397570c99bf180b1ff44caf547d53e9d85d7edfd8aa602e129fb935c63cf2836b4c71587a69ab39ce45a8053b8d8482fed86a6f79837629e4028761b07ba2283367c9475d66c", 0x52}], 0xfffffc6, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:15 executing program 4: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:15 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)=0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000500)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYRES32, @ANYRESHEX, @ANYRESDEC, @ANYRES16, @ANYRESHEX]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r3, 0x40081271, &(0x7f0000000040)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x12, 0x8, 0x2, 0x0, 0x2, r3, 0x20, [], r6, r0, 0x1, 0x2, 0x2}, 0x40) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000140)='./file1\x00', 0x1e6cfab2, 0x6, &(0x7f0000000800)=[{&(0x7f0000000200)="661bd5ec9c11cb521a7c80f8d17dc0", 0xf, 0x80000000}, {&(0x7f0000000240)="f6015398531429e8198c99e0cc9fb46ce6d93f6afb05de26575176479177b87fdb8d2454b33e", 0x26, 0xfff}, {&(0x7f0000000300)="ab647ca3e5ec0427ff856251d23450f38990aefe020a3d30df160deba3404ad340af7020113aeebbb0c223f365ccba831234360f4621978809f62bbb230ddfade5efba6a659dbaf8861b723ee45407696a7f51bbef5a9ee72b5b773a6272e852b2a3a2123af61fce010d18", 0x6b, 0x4}, {&(0x7f0000000380)="2baee123e1161379147298d9641ba5e9a9d52f7c9b93e13e3aeba30ac8982b0834de60bfafa4dfe1b4f5e3137fc11c8229c927138244d64f08b0ceaa4f68262b9e0b5d3ac40194b71606b33b26688e8aa5b503c12dc44dcb7bf66dbc545ce58d06cd9cddd455a7d9d7f93465c8e973792362a7c3232488352ed52ac9fe8d77edd45d30613a7fbef2d8938f27c2993d3a51dea8", 0x93, 0x7}, {&(0x7f0000000700)="63e19e5725b74d957d10bca7024568274a96d1b5a6f0fab6076a64f88ac98eadc7b0c70cb0a758e37037a715ec0818bc6c71c7cbf31d63f26b5a9ef4a77fdb84166dbd8ed360ef8464c19585483eb5f9ce88c2221c866021260144820480d2928a42fad9d608432f17cd559f5605bf12c7d26f16ccadb31d0b0f3d9ad5c7b4f0b1388bef4a5ab034f298191a9d88d238efbf589393600adc02fcb27449c6fe129627d78813353aa243", 0xa9}, {&(0x7f00000007c0)="81f981716da4508acfae2507efe8ede09c", 0x11, 0x3c}], 0x800024, &(0x7f00000008c0)={[{@balloc_hashed_reloc='block-allocator=hashed_relocation'}], [{@hash='hash'}]}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:15 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:15 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d7669727469672c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b66736861742c657569643e6b77dd516ab869ad1ad8d7207259c3206ad9a11e6a5dab635a6f68b8934cc1edd7b564bdf0b8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f0002a5d595d2e8ee6ac7fa71809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9e99165e3c5ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939000028dd65808d7a6c47ec9e4bedab69f791a20e2f"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:15 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x5, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3709001a", @ANYBLOB="230000000000000014758b284b84a034ebcefe0c432517a5c7ba412254cf64a65befd21f101aeef1206c066940aa90cc20729e3cc4b6ad56d986639f9bbe84ed1ed2095bb3a334af7d28433e0a47a54c770922ed6db1c7d27e01cf5e02bc9b3b6f03c2bc286ac4026c3af3b084fdc79b02bf919e00008000"], 0x2}}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x40000080806, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:34:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x44}, 0x18}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:16 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000140)=0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) ioctl$int_in(r2, 0x5421, &(0x7f0000000300)=0x26) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) ioctl(r3, 0x933, &(0x7f0000000080)="5e435067a7ba29ef5dab5f84c65cf973f7415785542345ebf25b643a5a15ace747401236") 15:34:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1613.401842] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1613.423365] FAT-fs (loop4): Filesystem has been set read-only 15:34:16 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000300)=""/103) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x9, 0x21}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e8521fd92f4bd44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360dadfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3f939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:16 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:16 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="74726159a2040000000000002c64656275673dee156438f0ebb0a03078303030303030303030303030313466382c736d61636b66736861743d736d61636b667368", @ANYRESDEC=0x0, @ANYBLOB]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x7, 0x0, 0x0, 0x0, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:17 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x58, 0xd, 0x6, 0x5, 0x0, 0x0, {0x6, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:17 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x1011000, 0x0) 15:34:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x44}, 0x18}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x400000}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be04bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e00"/252], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:17 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r0 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r0}) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/414], 0x190) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r4 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r4}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0x1c, "8298becef7540bc9b6cc4f7c4008986ced4a74fc3890f75ef798720a"}, &(0x7f0000000380)=0x24) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000003c0)={0x9, 0xc, 0x7fffffff, 0x6, r5}, &(0x7f0000000400)=0x10) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x10000004, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000140)=@tipc=@name, 0x80, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/122, 0x7a}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000340)=""/103, 0x67}, {&(0x7f00000003c0)=""/93, 0x5d}, {&(0x7f0000000440)=""/98, 0x62}], 0x5, &(0x7f0000001640)=""/4088, 0x1000}, 0x4}, {{&(0x7f0000000540)=@l2={0x1f, 0x0, @none}, 0x91, &(0x7f0000003a00)=[{&(0x7f0000002640)=""/196, 0xc4}, {&(0x7f0000002740)=""/184, 0xb8}, {&(0x7f0000002800)=""/67, 0x43}, {&(0x7f00000001c0)=""/62, 0x3e}, {&(0x7f0000002880)=""/236, 0xec}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/104, 0x68}], 0x8, &(0x7f0000003a80)=""/23, 0x17}}, {{&(0x7f0000003ac0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000004000)=[{&(0x7f0000003b40)=""/8, 0x8}, {&(0x7f0000003b80)=""/148, 0x94}, {&(0x7f0000003c40)=""/214, 0xd6}, {&(0x7f0000003d40)=""/212, 0xd4}, {&(0x7f0000003e40)=""/227, 0xe3}, {&(0x7f0000003f40)=""/155, 0x9b}], 0x6, &(0x7f0000004080)=""/57, 0x39}, 0x3f}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="3e659ca7c5e581e5b35081f698ee731db848dfc3711b66e08b6945973c578500ac7435393f8520a0b00ef207a077bd403ed32e5b99"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:17 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000002e40)=0x0, &(0x7f0000002e80)=0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000003000)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002ec0)={0xcc, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000}, 0x4044) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000080)={0x6, 'syz0\x00'}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) 15:34:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:18 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x4, @userptr=0x1, 0xfa, 0x0, r2}) fcntl$dupfd(r1, 0x406, r2) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2014400, 0x0) 15:34:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x7, 0x0, 0x0, 0x0, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:18 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x101, 0x0, 0x0, 0x4000, 0x0) 15:34:18 executing program 1: prlimit64(0x0, 0xf, &(0x7f0000000280)={0x9, 0x1f3}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x40000000) recvmmsg(r1, &(0x7f00000003c0), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x40000000000000) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x7, 0x0, 0x0, 0x0, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:19 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x100c, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d770300000000000000002c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={r3, 0x35, "4017df3c9d0a0952ff58e689f5653e7ad6eb6115848c9f3c544fa36262d1b018a7d16cc94d3a5b628b7078057d6e81f89860d8ad04"}, &(0x7f0000000140)=0x3d) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r4, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$unix(r0, &(0x7f0000001500)="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", 0xffffff3f, 0x80, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000), 0x1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x2, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x8000, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000940)="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", 0x1d0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000140)={@empty, 0x3}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x1010, r2, 0x0) 15:34:19 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000080)={0x80000001, 0x40, 0x6, 0x4, 0x200, 0x9}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, &(0x7f0000000300)) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x9, 0x800, {}, {}, 0x6, 0x40}) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x40) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000200)=ANY=[@ANYBLOB="67d9b1450d341a1ce988f600c20001010000"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1617.025850] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:20 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB]) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x7fff, 0xa, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000080)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffff47, 0x2, 0x40, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="cc0ca9422b80c3c6acf117c8767da11fc20f11c7cdbecaad03d21ba6b96ab70d3f0da6731024847cdef74a2af25554922567bba12c79b0caa983ad63aabab2ff58e4155cad279f0bd89d7955883870bc91f5f65015accbe17647d1f2ff326ff862fcbbd67162098168263cecc5e1887bdcd92c8a09eb379e55f38ab4fa221f83cd1eeb46883bb3c20ce0fbaadfd1b1a119fc4576"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f00002f1000/0x3000)=nil, 0x3000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1617.507319] audit: type=1804 audit(1588865660.378:668): pid=18435 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1830/file0/file0" dev="loop0" ino=4851 res=1 15:34:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:20 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:20 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1617.717877] audit: type=1804 audit(1588865660.508:669): pid=18388 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1830/file0/file0" dev="loop0" ino=4851 res=1 15:34:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1617.770023] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.794751] FAT-fs (loop0): Filesystem has been set read-only [ 1617.807460] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.819926] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.829283] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.840822] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.853960] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.862333] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.879851] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.979884] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) [ 1617.998228] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 278) 15:34:21 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) setxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:dhcp_state_t:s0\x00', 0x22, 0x1) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:21 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="d1ff3f16aa2c7833b9767d512d96fe1d428ce077c0417cb913ce50bfce3d863e667b0a60aadc75ef082eab610dd0700b47a805c9a67558b7000008000000000000"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000180)=ANY=[@ANYRES64], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:21 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x2025804, &(0x7f0000000100)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0xf1}}], [{@smackfshat={'smackfshat', 0x3d, 's\x90ackfshat'}}, {@fowner_gt={'fowner>', r2}}]}}) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x710, 0x1, 0x5, 0x3, 0x0, 0x0, {0x9, 0x0, 0x2}, [{{0x254, 0x1, {{0x3}, 0x9, 0x29, 0x1, 0x7, 0x25, 'syz1\x00', "583f34d9cf50ac36e8b100c156eda095d7bc98d56d3f0e044fd4631c068559c1", "05932906677bd5f3cf833c158790c9186efc353cec7dbcbf2408169b314bc3cd", [{0x1f, 0x3, {0x1, 0x4}}, {0xa5d, 0x1ff, {0x0, 0x9}}, {0x0, 0xfff, {0x1, 0x9}}, {0x81, 0xfffb, {0x3, 0x1}}, {0x7, 0x8, {0x3, 0x7f}}, {0xffff, 0x5, {0x3, 0x4}}, {0x2, 0x1f, {0x3, 0x9}}, {0x7, 0xfff, {0x1, 0x4}}, {0x200, 0x8, {0x0, 0x9}}, {0x2, 0x5, {0x0, 0x6}}, {0x7, 0xff, {0x2, 0x8001}}, {0xd0, 0x1, {0x0, 0x9568}}, {0x8, 0x1, {0x2}}, {0x3f, 0x7, {0x3}}, {0x8001, 0x1, {0x3, 0x80000000}}, {0x1, 0x0, {0x2, 0x3}}, {0x1, 0x0, {0x2, 0x6}}, {0x2, 0xfff, {0x3, 0xfffffff7}}, {0x81, 0x7, {0x1, 0x9}}, {0x8000, 0x1, {0x2, 0x8}}, {0x66, 0xe7ec, {0x1}}, {0x5, 0xff16, {0x1, 0xffffffff}}, {0x17, 0x5, {0x3, 0x101}}, {0x7fff, 0x3f, {0x3, 0x690b}}, {0x7, 0x5, {0x2, 0x4}}, {0xc0, 0x4fc3}, {0x4, 0x47a, {0x2, 0x6}}, {0x7fff, 0x101, {0x0, 0x2}}, {0x9, 0x1, {0x0, 0x5}}, {0x100, 0x7ff, {0x3, 0xff}}, {0xf06, 0x9, {0x0, 0xf31}}, {0x7, 0x2, {0x1, 0x1}}, {0x7, 0x4, {0x3, 0x5}}, {0xbe, 0x667, {0x2, 0x6}}, {0x7ff, 0x6, {0x2, 0x2}}, {0x1000, 0xc215, {0x0, 0x10000}}, {0x6, 0x0, {0x2, 0xffffffe1}}, {0x200, 0x7, {0x2, 0x80000001}}, {0x0, 0x8, {0x0, 0x7}}, {0x0, 0x2, {0x2}}]}}}, {{0x254, 0x1, {{0x0, 0x1}, 0x3f, 0x0, 0x40, 0x8669, 0xf, 'syz1\x00', "f60967632de6582b653a56e9aacd75ca3e9d3addea484f1a131792265521e235", "393fdcb12de53a0f082bb09e9cd100fe02f7b0cdf28aad1dd75e7060f60a3259", [{0xfff9, 0x4, {0x2, 0x8}}, {0x180, 0xff, {0x2, 0x40}}, {0x3, 0x3f, {0x3, 0x1}}, {0x39, 0x7fff, {0x3, 0x7fff}}, {0x2f, 0x6, {0x0, 0x9}}, {0x1000, 0x1, {0x1, 0xd7}}, {0xfaa9, 0x0, {0x0, 0x8001}}, {0x9, 0x8000, {0x2, 0x3f}}, {0x5, 0xff, {0x3, 0xffffffff}}, {0x6, 0x2, {0x0, 0x8}}, {0x1, 0x401, {0x2, 0x7}}, {0x8001, 0xfff9, {0x1, 0x1}}, {0x7, 0x7, {0x1, 0x7}}, {0x7, 0x39, {0x1, 0x8000}}, {0x101, 0x6, {0x1, 0x4}}, {0x4, 0x6, {0x0, 0x7}}, {0x1f, 0x9, {0x3}}, {0x1000, 0x3, {0x1, 0xfffffffe}}, {0x589, 0x9, {0x2, 0x8}}, {0x7, 0x1, {0x2, 0x1}}, {0xcc0, 0x7ff, {0x1, 0x32e0}}, {0x7fff, 0x8c35, {0x2}}, {0x9, 0x3, {0x0, 0x8}}, {0x3, 0x9, {0x3, 0x9}}, {0x4, 0x3, {0x2, 0x4}}, {0x3f, 0x5, {0x0, 0x90e1}}, {0x0, 0x7fff, {0x1, 0x5}}, {0x8, 0x8032, {0x0, 0x3}}, {0x6, 0xc0, {0x1, 0x80000001}}, {0x3, 0x87c, {0x0, 0x3454}}, {0xf7b, 0x9, {0x0, 0x40800}}, {0x3, 0x4f, {0x0, 0x8d}}, {0x401, 0x4, {0x4209af4f4e6394c0, 0x800}}, {0x7f, 0x5f, {0x3, 0x400}}, {0x3, 0x0, {0x1, 0x3}}, {0x0, 0x7fff, {0x0, 0xc6}}, {0x401, 0x3f, {0x0, 0xffffffff}}, {0x0, 0x8, {0x2, 0x4}}, {0x11ea, 0x9, {0x3, 0xe3b}}, {0x6, 0x5, {0x1, 0x1}}]}}}, {{0x254, 0x1, {{0x1, 0x7}, 0xb8, 0x3, 0xfffb, 0x8001, 0x1a, 'syz1\x00', "17f7c1cc94b27536f9aa42bf0e52504479955bca86d820c6e67793009c9e187e", "d00d3774bfdc5b89513c7ca7a797c734ea8d26c0a5ba42cb28afcba136fa623c", [{0x6, 0x101, {0x3, 0x7ff}}, {0x3, 0x2, {0x3, 0x5}}, {0xffff, 0x8001, {0x0, 0x5}}, {0x0, 0x994, {0x0, 0x1}}, {0x12, 0x77c, {0x0, 0x10001}}, {0x0, 0xffff, {0x2, 0x7}}, {0x40, 0x1, {0x2, 0x8}}, {0x3, 0x7, {0x0, 0x6}}, {0xfff8, 0x6, {0x2, 0x401}}, {0x56, 0x7fff, {0x2, 0x3}}, {0x6, 0x5, {0x0, 0x2}}, {0x800, 0x8, {0x1, 0xf0}}, {0x9, 0x3ff, {0x2, 0xf8d4}}, {0x401, 0x1, {0x2, 0x7f}}, {0xff0, 0x0, {0x2, 0x7fff}}, {0x20, 0x4, {0x1, 0xffff8001}}, {0x8, 0x20, {0x2, 0x1}}, {0x0, 0x8, {0x2}}, {0x0, 0x0, {0x2}}, {0x0, 0x2, {0x0, 0x7}}, {0x6, 0x800, {0x3, 0x4}}, {0x6, 0x9, {0x2, 0xffffffff}}, {0x1, 0x2, {0x3, 0x1}}, {0x0, 0x8, {0x2, 0xe14}}, {0xffff, 0xbe, {0x0, 0x8000}}, {0x7ff, 0x90f, {0x2, 0x80000000}}, {0xfe00, 0x7, {0x1, 0x3}}, {0x7f, 0x71, {0x2, 0x40}}, {0xfff9, 0x0, {0x1, 0x10001}}, {0x8, 0x5, {0x0, 0x91}}, {0x9, 0x3, {0x0, 0x9}}, {0xa, 0xd4, {0x0, 0x2}}, {0x0, 0x0, {0x2, 0xff}}, {0x401, 0x800, {0x1, 0x401}}, {0x80, 0x6, {0x0, 0xf4d}}, {0x2, 0x54, {0x0, 0xde}}, {0x9, 0x0, {0x1, 0x2}}, {0x1, 0xff7f, {0x0, 0x101}}, {0x4, 0x6, {0x2, 0xc2b}}, {0xcb1, 0xff, {0x0, 0x9ad}}]}}}]}, 0x710}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb93d}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5000000}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:21 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:21 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1619.023669] audit: type=1800 audit(1588865661.888:670): pid=18398 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4851 res=0 [ 1619.044194] audit: type=1800 audit(1588865661.888:671): pid=18435 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4851 res=0 [ 1619.067394] audit: type=1800 audit(1588865661.888:672): pid=18388 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4851 res=0 15:34:22 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500), 0x4, &(0x7f0000000580), 0xffffff8b, 0x4000040}, 0x90) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="e921884f4db9555402b4"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:22 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x902) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:22 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0ab84f193a942739b91e2cf0200600f00000000000000000"], 0x2, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000140)={@private1={0xfc, 0x1, [], 0x1}}) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, &(0x7f0000000180)={{0x3}, 0x8, 0x2, 0x1a9}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:22 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000300)={0x74, 0x0, [0x6, 0x6, 0x4, 0x101]}) 15:34:22 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:22 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) setfsuid(r2) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="3cbc686435e56aead0a918cc3c5b00"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:22 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) 15:34:22 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="1700"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:22 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:22 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000180)={0x4, 0x91}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x18, 0x0, 0xfffffffc, 0x0, 0x1fd958b6}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x43}, @local, 0x0, 0x0, 0x20, 0x400}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:22 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) [ 1620.013737] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) 15:34:23 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0xa}, [@CTA_LABELS_MASK={0x10, 0x17, [0x5, 0x6, 0x6]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 15:34:23 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275c0a28854779970673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b66736861", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x8f, 0x1a, 0x70, 0xff, 0x3f, 0x7f, 0x81, 0x1, 0x1, 0x3f, 0x8, 0x4, 0xb3, 0x4}, 0xe) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:23 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000080)=0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB="6702ffff010000800000000091"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:23 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) 15:34:23 executing program 5: r0 = creat(0x0, 0x0) msgget$private(0x0, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:23 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000500)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="060000008bc577de1ce650e4c2d77c9a6431000000000000800000000044d8276b7234d34abb2057a1ae601b588b6a8556081f07446124bc67b99ab1c08fe8ea044f65f9243ce47e267afc853e4e966e1ce03cca6bbb89845b798431f3e87e9c0e604661f01669a36c6f21fe420a0727e26d0b", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="020000a0010000000200008004020000cb78a70faca54b0f"], 0x48}, 0x1, 0x0, 0x0, 0x841}, 0x1) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r4, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="67028f76d24f88dc9a70fbf2000200ffffe437e8fae765f20de7de4cc2945bb8a5980aa1f8dbaed5d696cff97c256233fa9713637d4d0e4aec03eee8798d717f5ccaa1a578fc06d1684a3fdf0d4fa3a61bd99c8bac75d469b261f436568d004118bc3a720599063f26cd270d22d33a81b00f5a3d39e43278613f68ea82a0d4afd0ab28bccd8fa8a995"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:23 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 15:34:23 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB]) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="b1095853adb37b7148d5e50795e81261", 0x10) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:23 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 15:34:23 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="588fd54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0fe0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d5ea7f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f871d360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348ebeb36f90a3176991a0dc6147e246a3da01ae606cd78de984d5c40a9b19f64173fa40e6dcd111d428987bf33b921ad7b49a6fbdc143b3d3c455b527c02f9f9d6bd4d607823ad0b20d5178164b6dc113d3ed347f55f9c2f8f7de93dcab329d1a3e7343f27111977b3adbefe51440b7b8141c21ab9bd795c245d5779876a6deaa627ad84cf99663f21fb0eb5f27fe030801c108e710e8d14ac2ff5a5a9fa351ecbe4774253c0478198e345577374f1e4d4a68dfd08bc4c2e5af0c979afb5c739b099890eab22be7cc205462604fb7a25ef702fa5ea2265d4545f50186bdbd2a"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1620.786499] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:23 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) 15:34:23 executing program 5: r0 = creat(0x0, 0x0) open(&(0x7f0000000080)='./file1\x00', 0x100482, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736861743d736d61636b66736861742c657569643ee407f44ea2b110f630f99473336a01fa9ef85a0e95586b5270092a8487af", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x140, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000340)=0x2) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x240000) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8b0900"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:24 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:24 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000140)={0xffffffff, 0x9, 0x4, &(0x7f0000000080)="dafaa031"}) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:24 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1621.537784] audit: type=1804 audit(1588865664.408:673): pid=18806 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1833/file0/file0" dev="loop0" ino=4854 res=1 [ 1621.584210] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.592658] FAT-fs (loop0): Filesystem has been set read-only [ 1621.603997] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.621556] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.630097] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.643692] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.661428] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.680469] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.688989] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.698168] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) [ 1621.706980] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 135) 15:34:24 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000001c0)='./bus\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="4119b7df75fb7ab08fa009e180bb4800d97140402ca8f2552a10d5c386b16b38e84f0007bed727e4b4cb1fdff80c825dc6a96d4ebbf54b4cee6d50664854b43ab86003", 0x43, 0x1}, {&(0x7f0000000440)="68a4f14570d1a40973282c6a9fdfc50335cf5c2d170475000eced8b8f41f7bd8f0b2ce562a445262af9110a744fe60c3f1fbe82c0d0ab0f79ddedcf8eace946fe70a9349ac595c2cc87b8bf5a2b67b9f5ae74712c7a43185d5822af74d64c9d421de75dd7086e3ecfa9d0ec5ff3e06632f1adb8d0c4c668c359039fe6fd2e05fdeb9cb3162ff4a9f480093a057c8d27370065a64c44d923b9d34462a076cd8c56def6111ed09d3794a670fa63c13c5076c39c22996d956d221ae604c0bf8caae8fa76a37a3866f5197829ab66ede7200e1013f2d6365c0673b766656e9baeb511f3905ebda2f7cc30022f7", 0xeb, 0x1753}], 0x1800000, &(0x7f0000000300)='vfat\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400400101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000100)={0xff, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:24 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:24 executing program 5: r0 = creat(0x0, 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000000000/0xc000)=nil, &(0x7f0000008000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0}, 0x68) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x10}, 0x10) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) r3 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r3}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="40020000250000032abd7000fcdbdf250000000063bd6e6e96191de26e60ba52110e596db776e3f7f33761f5d1022cda5eb30298ca0f272d2bd858c8b71e3c2c1096ad56292aa789f4e1cb0cf0b7d4ff959ee40ed9f5f8131c51914d1f6af3ec7caeaf11343926e104335befb2035a994198b0417b33b00d48b3d2b600c028bd177e979d50ddcc464ca6c24fa4ec9bfa875742dd52944a2b8b281c82cbf06249a3985b7f2fa08f305d30b5510808b5b6666431cd8ca904187aaa1b198fa9928e7ea0e5e8057735eb2632b0ef1314229aabaf816077aac681c33b3c8c7c", @ANYRES32=r6, @ANYBLOB="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"], 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x20088c0) 15:34:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x10000011, 0x5bd, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1622.020903] audit: type=1800 audit(1588865664.888:674): pid=18736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4854 res=0 [ 1622.040881] audit: type=1800 audit(1588865664.888:675): pid=18806 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4854 res=0 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, r3, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x51) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:25 executing program 5: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa}) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="01048204c03f9abe21000000001043ad7aedb5d464f95a3bbab0fa9802f2ee98dd79"], 0x12) r4 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="f7354acceb4f42cf00e660f8798be62c00b26da88d4e7f5fcd7a5f63f430d9fb18ca2d37d8ac8caf959464c866161d0432b53f285dfb5ed00500099fda41db63b8ff563daa2d4948d4a2d6763959aab5f108cfbca612f53a4276ca95b9fa6a1f9459783f05d041288a184b18709860d4a41be18fe4a47d4e211eea26b97b910dee4ab29c02358b2769aa0b6fbc1f58a5566a13ec51cf4e70a895830d7d2bbcf14dab9c15cf8f4ac277c960b5a14cccc7a198113bace206"]) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) r5 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x2000000, 0x3, 0x20, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f", [0x800000000]}) ioctl$BLKFRASET(r5, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:25 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x3, 0xfffffffffffffd8a) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x5, 0x400) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="14490fceaed47e344a283a27ef013ee666c48a4c90ee80d5613b07d0d70900000000000000bea9b5c608dee09d451c46284a67eef79e4cf69265f1813b583853a8726e6209307f758a6804d97ddf78114bfb1b6e50342b154f08f9d564751e24c144dafaa47c49313576de55cd0fcbd747e574a57c1ab7000000000000"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:25 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x1852c0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={r2, 0x400, 0x0, 0x8, 0x2}, &(0x7f00000001c0)=0x18) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c2ff00000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:26 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x200, 0x20, 0x0, 0x7ffffff}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/367], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:26 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) timer_create(0x0, &(0x7f0000000200)={0x0, 0x14, 0x2, @thr={&(0x7f0000000180), &(0x7f0000000380)="7386251417149f45c5863c2e759bb5c03704dc51c85f37abf3676ce7cd3dc9d0cae06fcc64d909a232fb38474c4736f8480258f3e6f55c987a0965bf604e22394267ea1cdaa2b87c765c0a65456fb872e53a34601337478a81a8fc9f5f7521f45764d268f5a06885fe44efd9d9fe078b73d680f7c2de081253895fcd71f1c960f5e67eb131cea19cab52854c65d9a517ea0ea9d728d2092631e9a13ded6ea3605a2031025f11d7ad1c462a6d351b16d3c267fb5202bf121a8e91555344434c60"}}, &(0x7f00000000c0)) mount$9p_virtio(&(0x7f0000000400)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x400, &(0x7f0000000500)=ANY=[]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000300)={0x9, 0x1, 0x4, 0x20000000, 0x7, {0x77359400}, {0x3, 0x0, 0x2, 0x1, 0x0, 0x8, "57eed8d1"}, 0x7fffffff, 0x4, @userptr=0x101, 0x5, 0x0, r0}) socket(0xb, 0x4, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="bb0e000000000000616e000000001c0002800600140000001785099910fcffffffffffffff00000c0002000e0000000a00000004000380b05feb1174701a9679a6592769000c00"/80, @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x5c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={@mcast2, 0x27, r6}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:26 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:26 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaa9b6e9c286775384d68312afe7eec1b3a7a32cad6248000000000000000b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e00"/252], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:26 executing program 4: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1623.750012] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. 15:34:26 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x3ff, 0x0, 0x20, 0x10, "00100000087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "00000000cc61acea23c4f3f3fa50d9af5bb5cddef05e112caf8d8b649b033f00"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:26 executing program 4: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:26 executing program 4: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:27 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=vvrtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:27 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:27 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0) 15:34:27 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x10000014, 0x0, 0x7fff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000400)={0x7, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3d}}}}, 0x108) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000380)=[{&(0x7f0000000640)="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"}, {&(0x7f0000000000)="6d0acb340fc3e7ac2a29001e80"}, {&(0x7f0000000180)="ef3271bb962ef34f6ab5a98c5384e1254f94e56c6d68abe1559f62d8da8e064e37eb08254e9d42ffb2b551ce3e31c103694fa0c510fabca7333b7c1bc77054f134bbeda728aed2baf99833196970924204a88b6d69781762f69c8f57254502b316d9c1611780d167784f"}, {&(0x7f00000002c0)="53067ffb784c547ed354bb2c3c9656e34e463cdf236f9db135ca0c80ffedcaa6522a1c8f0a367afe01db1cfad0cb23a456203aa07e70a1f11b5ff4c474bb1dd6c8e2b3ed2e49feecda36ec0374840a9f4828484feea6699b716b44471d2d7d0eb7d8ad3988cde079ba0baec2479ba2be891a9d8fd84aa2cced3795b0b806f43b815e511d426d1b8bac87c67f9a5b949630def142e2ea9fbadb7c13add4d101bc4625c05c5c4004caee2d8ef2325460"}, {&(0x7f0000000040)="844b26855ccaaa9b4d6984"}, {&(0x7f0000000240)="ea9bada72af315c015a791"}], 0x1, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:27 executing program 4: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:27 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0xa4, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x4c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8, 0x1, r0}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r0}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9b}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000040) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="030200a4509857"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:27 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=virtio,debug=0x0@000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="2c24fa140762fb2897eb51befac45c0f62e1320876de531461b4e364b5a9a1f7d63ffb77bc22b102c2b7ecb56263390863fb37213a"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x1}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000300)="0d8570d1683fe60474cb", 0xa, r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) keyctl$chown(0x4, r7, r9, r1) 15:34:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f00000002c0)="edb99b63294ef3b853c30be87e5b7f486f81643518930cba709c712a1c89a1a9ba8d8b4b1a381e05187f000000d0fe2ed55bd6c80470322d566ee5dcef7f63da294f0e16f093bd4ef15ede88fd96276f39a3e1730a5b421bd787180c4a716280ffb62a85f725f5017d55c5522e2c20bbf38a5389ed", 0x75}], 0x1, 0xf11b546dbb1e00e5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:27 executing program 4: r0 = creat(0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1624.709641] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:27 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x40840, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x1000, 0xc0000000, 0x9, 0xffff, 0x800, 0x3ff}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:27 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:28 executing program 5: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000040)) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) read(r2, &(0x7f0000000500)=""/4096, 0x1000) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x9, 0x8, 0x3a6}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x14, 0xd, "c15bf01f089a9b6b2b4ef2eccc1680e2184072b427e00b418ce9de9ff32e08ee09000000000000004593f4be0000000000003f5300", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:28 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x7) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="da9b0402d7fde633df282054dceb1b7123c538b04bcfef2108564ea736df7f135e203c22256ac38cd629150fe575247cee2ad9db69b0a4df0856bcde2458ac9d3e5cd6745d3b1064caa101ec3b4a5e4d8e65cc4c918abc24ff71b715f0a2ef5ef2b20d07155006502c2dc75da9f6c9de19d359ad2b33be0fd31e36a726640a3f2e30ad2232f80ffe0a02"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:28 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1625.500628] audit: type=1804 audit(1588865668.369:676): pid=19122 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1837/file0/file0" dev="loop0" ino=4856 res=1 [ 1625.587779] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 181) [ 1625.605815] FAT-fs (loop0): Filesystem has been set read-only [ 1625.617442] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 181) [ 1625.661440] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 181) [ 1625.683406] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 181) [ 1625.700298] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 181) [ 1625.746429] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.790766] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.802242] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.812448] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.825962] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.835720] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.846596] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.855984] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.868592] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.879468] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.888999] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.903208] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.912788] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.925972] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) 15:34:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:28 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) socket$isdn(0x22, 0x3, 0x22) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000300)={0x2e, 0x6, 0x0, {0x3, 0x5, 0x5, 0x0, 'debug'}}, 0x2e) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x3, 0x8000) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x40000, 0x0) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000380)) r3 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r3}) r4 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r4}) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x400) sendfile(r3, r4, &(0x7f0000000080)=0xffffffffffffff80, 0x200) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004c00)=[{{&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/108, 0x6c}], 0x1, &(0x7f0000000340)=""/76, 0x4c}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f00000003c0)=""/130, 0x82}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000500)=""/104, 0x68}, {&(0x7f0000002640)=""/167, 0xa7}], 0x6, &(0x7f0000000240)=""/53, 0x35}, 0x401}, {{&(0x7f0000002780)=@generic, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002800)=""/187, 0xbb}, {&(0x7f00000028c0)=""/168, 0xa8}, {&(0x7f0000002980)=""/139, 0x8b}, {&(0x7f0000000580)=""/2, 0x2}, {&(0x7f0000002a40)=""/193, 0xc1}, {&(0x7f0000002b40)=""/222, 0xde}, {&(0x7f0000002c40)=""/98, 0x62}], 0x7, &(0x7f0000002d40)=""/185, 0xb9}, 0x80000001}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000002e00)=""/234, 0xea}, {&(0x7f0000002f00)=""/187, 0xbb}, {&(0x7f0000002fc0)=""/52, 0x34}, {&(0x7f0000003000)=""/155, 0x9b}], 0x4, &(0x7f0000003100)=""/202, 0xca}, 0xed5}, {{&(0x7f0000003200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003280)=""/83, 0x53}, {&(0x7f0000003300)=""/121, 0x79}, {&(0x7f0000003380)=""/113, 0x71}, {&(0x7f0000003400)=""/189, 0xbd}], 0x4}, 0x1}, {{&(0x7f0000003500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000003580)=""/1, 0x1}, {&(0x7f00000035c0)=""/204, 0xcc}, {&(0x7f00000036c0)=""/4096, 0x1000}, {&(0x7f00000046c0)=""/188, 0xbc}, {&(0x7f0000004780)=""/26, 0x1a}, {&(0x7f00000047c0)=""/19, 0x13}, {&(0x7f0000004800)=""/134, 0x86}], 0x7, &(0x7f0000004940)=""/251, 0xfb}, 0x4}, {{&(0x7f0000004a40)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000004ac0), 0x0, &(0x7f0000004b00)=""/196, 0xc4}, 0x6}], 0x7, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000004ac0)=ANY=[@ANYBLOB="9918dabced1675976193ecab11cd16d5eb896b2335c4e85f9ff0763816a90f765f304925c1f0d84bd5d9fc3ff1ea"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:28 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x1b) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB="000101000f00000054af2dd972f200000000"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20040, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) 15:34:28 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1625.937399] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.949713] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 181) [ 1625.961280] audit: type=1800 audit(1588865668.829:677): pid=19065 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4856 res=0 15:34:28 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1625.984793] audit: type=1800 audit(1588865668.829:678): pid=19122 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4856 res=0 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@dev={0xfe, 0x80, [], 0x21}, @mcast1, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x9}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:29 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r2) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000300)="5a7fa870d486e87585ff320804154d1dddce3c6b164614a2f504b7ab22dfd329f27adc9ed37b01921c28ad127fa0bbf3233fa221ab2290443bab992b34be013ad21ae60caf81cb5f8ad2319ea548d1e7796226be8d1813d3b0ae7c45d081e3c5c4897ed01a099313fbdd4d522cd17c72f3209ef6d693dd201a81c221db6e7e78dd5a2ffc784f7cdb8ac6b3a6801f503fa8ee575d135274a695e62f136c94eb3397ab07451ba40fe0d93a8723cc68c12e1d086db933325ede7782103d2a5e36075fac596442ed9f6f11fcb0a8cc2b3a52b41f9bd0e0a401e962e71ba9ad3e97e0bdd4204c2491648b", 0xe8, r3) 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:29 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="2c0064f0889f3ccf0224194f6490ae72dab9a939760221d0cc5d495806f23c76286d1d0da2142d58400111d209f750b2b348749eb7c359cfd5d78a6018a27461db5f2cb4a0854e11488397314a0f5eff4fb884252b11209a0cd52b9b747db6696724e0cf07aa88534c7fc32037af6b036b7ec4021993866c014008165723f4"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="7c05e9f12109f54007a3d191e381", 0xe}, {&(0x7f0000000300)="7290c389972a2cc21dc2ad5a7bcb53ced0286432720aef92f4fa4f048a29ac814136df33364c38d41afa344ac35be6fd503790fad95f073a1926f609ef68c58dc6d275e0995619bd882cc5ef28ec19c834f9fc07533daae8b9c3ff6d1c45a1a8c207db8ed1a23644f29b836848308b77856111c38aeb631c08bcde986bd20499c7fe0fbe6018f9db4199971169571537cd5ba9bf1248e93dea8cfd9f5d00fcac566d777fa3700b56a8a01b5a3c73f9b4a06d8ba0e45fbf91781b0631997cd50233ee1a278908886c86bf5a0b0e9ec52e", 0xd0}], 0x2, &(0x7f0000000500)=[{0xa0, 0x111, 0x0, "0a102b691ce24748c19b5c04f644872b397d01c5f3be74da32a9969d55672933e9db2d13ee8f88e1aa2c924c1b38deb31a41af4eb085d240a5e69457523b5869420c1daa73a6683d7a805c8a79fbf23b3a2df584d40516a1a5668199d05efe14f2cab777c422f621d9d9eb9648a6f608bf1415b4c12983326cfeb5e9d152891a8b33f073f0a8e1ef834234"}, {0xb8, 0x10e, 0x3, "663134bbdf9ae4dcb29bbe3f2eab47e6b45b2c873d2e859533eb5aa04abfbac6e9d1992137a28eb6c8576e129dee19429d52b5980add41856b4a434df2ba92c78c948750eb9223a8b3de8d94760d3cae5c33a906d0fcfe8a525154d24e59e0de689fdef1b879b7267bfc5d322a2e3f2f3281a574cf584355ba649277ac42a8f2ccfd9c691c5cdc22e9f28c028f011bcdb3999a54b594738164422fe8d4f6c74bfd"}, {0xb0, 0x111, 0x97, "2906bf770f02e293958ca63715268401e788367c417e378175bdb9dcddda212e91a7aa276e16545b1737a74c63e70513d3adb8ccc6c7b2bd5a93d7181886cc48ab3fe0844645e0c779803d9f22b27ebea6fa62829ddc3f87cd5eec1ae0ae822972a4b376802b6905a3f6cad903d34f3a080b4f21ce8223902c964b22fabecf80e316d48372fe5f11608fa77efd506a1af02cc42a5716b4062622e22d"}, {0x10, 0x29, 0x80000001}], 0x218}, 0x20000000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1626.565678] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 15:34:29 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[], [{@dont_hash='dont_hash'}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0xb66, 0x9}) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="fdd8e775b2b56269996311edbf0000"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r2, 0x10}, 0x10) 15:34:29 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x400801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) [ 1626.893783] audit: type=1804 audit(1588865669.759:679): pid=19233 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1838/file0/file0" dev="loop0" ino=4858 res=1 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 15:34:29 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0xfffffffd, 0x7ff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1627.425181] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:30 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:30 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:30 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) keyctl$chown(0x4, r4, r2, r3) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220040, &(0x7f0000000300)={'trans=virtio,', {[{@dfltgid={'dfltgid', 0x3d, r3}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r5 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r5, 0x1264, &(0x7f0000000280)=0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f00000002c0)="cc8789c0e133e4d0640b97ad2ac7a98c5083095b5432f1564f6823a82283fd44309b5daddd4cced5fb89f9b03364581c6ed54c4e21e7433fd37e33cd02ae4fa6ecf3bd763f83db21c1cbd53e7fa01923067ca39ff5e58f23f6c1acaf6f7b625fd1b2d805f6b454916f53f3362e2246929848f0b17e56494801f816ad6ccebacdac733c580ac7ba959b2f7db6472a6c1985", 0x91}], 0x54, 0x3) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1dbb62649d3994ddd5f59a9ed23e3f2c355e8fc6617a64b41b895b3587a9c6171815f1dfd4fee472d0753bcf41319a1a062d149742856b6c8a3ac9ef9947420ea6bd1d2279717242b0f395f6cfb86ac1ad74eed77c036981c00c099ec1a8a31baad1e126605e736ad4613e70328eb70d2ff9ecfcc10b5530b7b2df2efdf4b7d7b24240d1814494"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000240)={0x0, 0x1}) 15:34:30 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x0, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) [ 1627.873274] audit: type=1804 audit(1588865670.739:680): pid=19314 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1839/file0/file0" dev="loop0" ino=4860 res=1 [ 1627.976556] audit: type=1804 audit(1588865670.839:681): pid=19320 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1839/file0/file0" dev="loop0" ino=4860 res=1 15:34:30 executing program 4: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x4, 0x0, 0x0, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) 15:34:30 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e20, 0x4, @mcast1, 0x5}}, 0x0, 0x0, 0x1a, 0x0, "7f6bcd71e446b145a66b09e6eed9cf8297cb2a8bb66b330d507e538d0871ccd86a7d4752ce8a65525157c750069997870f7807c0fd11f12248cf2ca60f49fa55303bd8d009b22ab16bdb3dd9f201468f"}, 0xd8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1628.019683] audit: type=1800 audit(1588865670.889:682): pid=19280 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4860 res=0 15:34:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:31 executing program 4: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:31 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="4c000000000000002c08c5d89b1aac7530"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x40) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="35eb2618cfbdefba098c455a886a040004c42c866371f80439674d758e0f98aa6729a7ff77442eb86d15a9580c0a579435f7cc6d2ed474028705bb9d100c721a72d371b12609aae13dc786ecf51124ee452c38aee3a2bff3adad1c0e11180435c80094770209afb8de484e9f25aaa25bd36be53aaa91b88d02e45a8175cdeb86c91ce8e955ddecc06db1814a158e85021202dc4820e51f0a63b7daf50000000000", @ANYRES16=r3, @ANYBLOB="2107000000000000000004000000"], 0x14}, 0x1, 0x4000000000000000}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x7c, r3, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x34}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x14002) ioctl$LOOP_CLR_FD(r4, 0x4c01) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r5, 0x40081271, &(0x7f0000000040)) ioctl$SNDRV_PCM_IOCTL_INFO(r5, 0x81204101, &(0x7f0000000500)) creat(&(0x7f0000000400)='./file2\x00', 0x8) [ 1628.094181] audit: type=1800 audit(1588865670.889:683): pid=19314 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4860 res=0 [ 1628.119164] audit: type=1800 audit(1588865670.889:684): pid=19320 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4860 res=0 15:34:31 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x40000000}, 0xc) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={0x268, 0x1, 0x5, 0x0, 0x0, 0x0, {0x2, 0x0, 0x8}, [{{0x254, 0x1, {{0x2, 0x6}, 0x0, 0xe9, 0x5, 0x33, 0x1f, 'syz1\x00', "20ba8460d9503218c845858465fec8011b54e4feb8d3f1b5362153a4dd8937f7", "13607e75ad32487b6828fb97b2dd27829c00bc4d897cb083123a3130d4052db6", [{0x1f, 0x4, {0x2, 0x4}}, {0x4, 0x101, {0x1, 0x8001}}, {0x5, 0x5, {0x1, 0x40}}, {0x4, 0x5, {0x0, 0x80}}, {0x0, 0x100, {0x2, 0x3}}, {0x9, 0x9f, {0x0, 0x20}}, {0x3, 0x5, {0x1, 0x6}}, {0x4, 0x6, {0x3, 0x8}}, {0xfff8, 0x1, {0x2, 0x8}}, {0x3, 0x7ff, {0x3, 0x8}}, {0x800, 0x0, {0x2}}, {0x3ff, 0x0, {0x3, 0xfffffffe}}, {0xc1d, 0x7f, {0x2, 0x5f9e19a3}}, {0x200, 0xfffa, {0x0, 0x1}}, {0x61, 0x4, {0x3, 0x1}}, {0x1, 0x80, {0x1, 0x4}}, {0x0, 0x7, {0x3, 0x3}}, {0x3, 0x3, {0x1, 0x7}}, {0xfffb, 0x9, {0x0, 0x6}}, {0x5, 0x200, {0x2, 0x80000000}}, {0x5, 0x7, {0x1, 0xffff}}, {0x401, 0x9, {0x2, 0x2}}, {0x1c7, 0x0, {0x0, 0x3}}, {0x0, 0x80, {0x2, 0x8}}, {0x4, 0x7c9c, {0x2, 0x961d}}, {0x3, 0x60a0, {0x1, 0xfffffffe}}, {0x40, 0x4, {0x3, 0x20000}}, {0x3, 0xaa, {0x2, 0x15}}, {0x7, 0x2, {0x1, 0x8}}, {0xfffb, 0xfffa, {0x1, 0x100}}, {0xfff9, 0x400, {0x3, 0x800}}, {0x0, 0x4, {0x1, 0xff}}, {0xcd, 0x6, {0x0, 0x6c5}}, {0x8, 0x80, {0x3, 0x996}}, {0x9, 0x6, {0x0, 0x7f}}, {0x5, 0x5, {0x2, 0x80000001}}, {0x7, 0x8, {0x3, 0x56a3f900}}, {0x4, 0x8, {0x3, 0x1ff}}, {0x3, 0xca, {0x2, 0x4}}, {0xbb6, 0x4, {0x2, 0xa77}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x80}, 0x85) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1628.395361] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) 15:34:31 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x101800) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:31 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5571}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x0, 0x100, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)="9b5a2a1cd485c9f0c53171d2f107a6d3f84edb998fd01e0147072ec45f06d9a451618d2101ef85247157212f0cf0e9624b1d07b93d9c61b71f54dc5c6bc3e2c72a4f8e6fc9364ce62cba95ce34c9b00fbdd5b000dbd52fbe62c31909345c74a46ac902ab68154e6e3d73271b17a86b3f493d8b8f386ff3259f63f1bba0a84857b2a11f88b5e116dbe82fd8f6a4807ced2949fe53ba6608b82d2b2643972afc4ef8ac784e99b1abf27407df82d6cae45c4c1c69ccc0a5c2e1c3625af2e301036c842a33ab882bcac0fc81de2460334091d2ae9b59d0019c5788a06d3c9710f92f3b27e9728d1f3d1375fb2087cdaaee1b17", 0xf1}], 0x1, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:31 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r2, 0x40081271, &(0x7f0000000040)) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000300)={0x8, &(0x7f0000000140)=[{0x9, 0xf000}, {0xc61, 0x9}, {0x2, 0x2}, {0x3, 0x4}, {0x6, 0x7}, {0x7fff, 0x9}, {0x7ff, 0x9}, {0x7, 0x101}]}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)=0x4) 15:34:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x800000) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c7161c4ae1ef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460ce185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e9394586280010808d7a6c47ec9e4bedab69f791a20e2f35c0348e66c72216f3dc1633fbb316e2014d0e2b9ef7a54b87b7a034f8234a31267e5d1ae899cfe2f37bc4b95626d13da03f7806477dd3f5cb0cd98209070ed311fbf19c9a2709c05ac3642f830198d4d9214f49edfe9cbcda12eca63e2b3cbac5be94f4f3c1591a60e92f7fe101d6784a5c282f46e36165f286217a76a6b3472d5f702fdafe399ea91c988a4a311a8b5f146b7411f68736c19a08a7d78f9cd1baa10357954810bbfdc70e4f4da5e1d07a4babf31d739a7339b1af73b04a44f6b2c5d5f67a4c303632ff10f1b1a8bec9e482b14376b82fc4bca0f17eb94af44860fcda33e2ed09020f4aeaa99645a63517c98e861c37109143bd6bb75957598c9fbda57a48e37d9264c485b4c925834f013de16640bce4ec4670171f6c8f164f3ad58b2901374e1e3643c2087e6c92dcea1317"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:31 executing program 4: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1628.954410] audit: type=1804 audit(1588865671.819:685): pid=19370 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1840/file0/file0" dev="loop0" ino=4864 res=1 15:34:31 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1ff, 0x8, &(0x7f0000002640)=[{&(0x7f0000000580)="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", 0x1000, 0xfffffffffffffc72}, {&(0x7f0000000200)="10d97aacd041f6ab05b259d2d7a5f93115db02b6bbaf8e8287954829395f1be0733841da3fd9e9b82d8d97", 0x2b, 0x4800000000000000}, {&(0x7f0000000280)="a292c61eb4a6216900e1dba61c54a3b4984dfbc154ac873008a52f08500c5dd83d558780f1cc78eba0d5d774796a25aae4856a0eb5b5c067ce1769485ccf9c80bd7d88c5e60c693ce05e7028531b748188b35320589c02430a5f5e625016e5fe20fe497da2e601157078d11bf79e0273257ac08fd99787a22cfaf86255eb72034eb4290693cfe940d48aee452a", 0x8d, 0x9}, {&(0x7f0000001580)="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", 0x1000, 0x4}, {&(0x7f0000000340)="b403cadfaf426e2b09fa522b73301523245f32a5cf0b70fea5358d6872bf24af1c9b", 0x22, 0x1ff}, {&(0x7f0000000440)="3728be8acfb32164929217c6322c8699ba5400cb751789f9c611055833ed49cbc9039a0deabc08c17ebd0e5bebc17f11431ca5efa0ea6b8cb1d34c2a3d9108bcd7260636b8f0ce4858e207ab6a9f8c475fa02022619580eb2d788853d323bae6391a1a4a8b4ab8651f2a4a9b0e66c441a32a895ec40864c8adbb25751691d6c4e3e7281d4f968f11f71dfa83c86ff57bab", 0x91, 0x7fff00000}, {&(0x7f0000000500)="380b3d64a2cf1a802b65f4d6fe73930b8e88108dcb3e60ef4269b503d191d249dad8f3f9f6c7115d450ddffafb3810178f", 0x31, 0x9db}, {&(0x7f0000002580)="c5aa9baff46d403ca337dd3985f7fd9ad2edb7f198030f564827a5cabe3763dd08eb02b973a89ef810ff4a2e2408a17524aa2213ef96d0076d9933fc4a4731df7efd84ea16c1a98f1f89a09d3e9280e204d2d295c584e314f3119d14e53c2a045c1fa10b97252b4cd46b67c813f504fabcb492d6b4f7ce9d7075230208618ab5f27b179702d1fbe05b88f5f49ef09bb33e3534612be8b92702204a6427a419279b", 0xa1, 0x10000}], 0x400, &(0x7f0000002700)={[{@errors_ro_remount='errors=ro-remount'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}], [{@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'vfat\x00'}}, {@euid_gt={'euid>', r3}}]}) 15:34:32 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file1\x00', r2, 0x0) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x230000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,fsname=1$,euid>', @ANYRESDEC=r2, @ANYBLOB=', ']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1629.089902] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1629.102473] FAT-fs (loop4): Filesystem has been set read-only [ 1629.268475] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=1) 15:34:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x4) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4d24836c2af9d62cfeadb52a8f8e66572cf62a9ac596c014d68dfb46b645bdd82ccc082d43d3d6c98754e292a480c9a4590ef9fedfa0448eedf10e2b18894a1bf4d5605cc018c160e9f71421c8d2caa7210c1351d85c7ac5f1e3eedfa04d8180607d9b5bcf3cff92070690620096c7cde4aa1583d14c2ebc198961bc749f1761963200"/145], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f00002eb000/0xf000)=nil, 0xf000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:32 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x10001}}, {@loose='loose'}, {@msize={'msize', 0x3d, 0x800000080000003}}]}}) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000ac0)={@private, @private}, &(0x7f0000000b00)=0xc) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r3, r4) setresgid(r4, r1, r1) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r7 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r7}) recvmsg(r7, &(0x7f0000000a80)={&(0x7f0000000300)=@un=@abs, 0x80, &(0x7f0000000900)=[{&(0x7f0000000500)=""/205, 0xcd}, {&(0x7f0000000600)=""/225, 0xe1}, {&(0x7f0000000380)=""/148, 0x94}, {&(0x7f0000000700)=""/94, 0x5e}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000080)=""/59, 0x3b}, {&(0x7f0000000840)=""/190, 0xbe}, {&(0x7f0000000140)=""/8, 0x8}], 0x8, &(0x7f0000000980)=""/204, 0xcc}, 0x40002040) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x1000001}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:33 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000080)='./file1/../file0\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e7327e3fc0a74696f2c64656275673d30783030303030303030303030303134663823686173682c66736d616769633d3078303031303030303030303030303030352c00"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:33 executing program 4: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="bd4299b8e2ebe82ab87dfbae34d35a65bda11a5ee85229d0803bcf0fffae0ba6c7b7f08bef918e2b4ab2314810e05f6fb3fcd97da2e15a726427bc20a0eb5055296672bbda"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:33 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000340)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r3, 0x40081271, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0x8) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1630.440009] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF 15:34:33 executing program 0: timerfd_create(0x9, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000280)=""/194) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x801, 0x84) creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = socket(0x0, 0x0, 0x0) fallocate(r2, 0x100000063, 0xa0b3, 0x3) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="09c7551b41655b724cb0b267"], 0x18) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27e, 0x2, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x85}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x222402, 0x0) [ 1630.494297] FAT-fs (loop4): Filesystem has been set read-only 15:34:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:33 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000200)={0x9, @broadcast}) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,saackfsht,euid>\x00'/65, @ANYRESDEC=0x0, @ANYBLOB="3ef6cedc599e06bbc5e4432d5c550c004a7d3e0c19d16f11773a96d396152b1d78170e5078547fb70b7de8eafc993890de02e9789cc155376feec87b02192e4b416dc9e75ceb65071ce898450e5d6759cb36e97f878f33"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r3, 0x40081271, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000300)={0x4, 0x8, 0x4, 0x40000000, 0x8, {r4, r5/1000+10000}, {0x2, 0xc, 0x3, 0x1, 0x46, 0x0, "bc3e92d9"}, 0x316ba3da, 0x4, @userptr=0x7ff, 0x4, 0x0, 0xffffffffffffffff}) ioctl$FBIOPUTCMAP(r6, 0x4605, &(0x7f0000000500)={0xf161, 0x2, &(0x7f0000000140)=[0xed8, 0x0], &(0x7f0000000380)=[0x2, 0xffff, 0x2, 0x20, 0x6, 0x7], &(0x7f00000003c0)=[0x9, 0x1, 0x200, 0x8001, 0x400, 0xc0, 0x7], &(0x7f0000000400)=[0x6cb3, 0x7f, 0x8c, 0x8, 0x8]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:33 executing program 4: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000500)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="060000008bc577de1ce650e4c2d77c9a6431000000000000800000000044d8276b7234d34abb2057a1ae601b588b6a8556081f07446124bc67b99ab1c08fe8ea044f65f9243ce47e267afc853e4e966e1ce03cca6bbb89845b798431f3e87e9c0e604661f01669a36c6f21fe420a0727e26d0b", @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="020000a0010000000200008004020000cb78a70faca54b0f"], 0x48}, 0x1, 0x0, 0x0, 0x841}, 0x1) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r4, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="67028f76d24f88dc9a70fbf2000200ffffe437e8fae765f20de7de4cc2945bb8a5980aa1f8dbaed5d696cff97c256233fa9713637d4d0e4aec03eee8798d717f5ccaa1a578fc06d1684a3fdf0d4fa3a61bd99c8bac75d469b261f436568d004118bc3a720599063f26cd270d22d33a81b00f5a3d39e43278613f68ea82a0d4afd0ab28bccd8fa8a995"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:33 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472617e733d76697274696f2c64656275673d3078303030303030303030303030313466382c736d61636b66736840743d736d61636b857d2aa010b0c2998477ba", @ANYRESDEC=0x0, @ANYBLOB="0a000f18066df793c4b25e6dd04db21d0eefb9cc1b965056956f52e106b71726dbc923375871a8740c06e3e5b76ae66277f9b8fab90e69c2cbd619b64e7ce8f57fb26c5c862f04138aa861e472447b886dc586d64d74a18d10ff30865ae2047037dd244c6242b68036c587d51e79fada9079424f4648d4ee52fc3cfe45031c1cc42dcc281b0a4364c249dabe6c15"]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000300)={0x7ff, 0x2, 'client0\x00', 0x1, "5e9896551a9a5fd7", "e5fe69441e2b3708eab61d2bb49b946b134c1fb1e4aaf9972de1d6bd23daeb96", 0xfff, 0x7}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r3}) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x4) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000003c0), 0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r4, 0x40081271, &(0x7f0000000040)) ioctl$VFIO_CHECK_EXTENSION(r4, 0x3b65, 0x3) 15:34:33 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r1}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x180000000000) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1631.185418] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:34 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x19, "c15bbeb398d39132739ef2eccc1af741a24072bc27e00b84b5988628d2ec775602a529359a4592f4bed6f4cc492689066c293f530000eea200", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f", [0x3f, 0x1004]}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) tkill(r3, 0x41) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x4, 0x0, 0x0, 0x7ff}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:34 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@noextend='noextend'}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) bind$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @remote}}, 0x24) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0xe83, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(r1, 0x0, &(0x7f0000000640)=ANY=[], 0x2, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) exit(0x1) 15:34:34 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='trajs=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="a11d"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@private, @in=@initdev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8b0900"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1632.232520] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1632.268652] FAT-fs (loop4): Filesystem has been set read-only 15:34:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:35 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000c22b16742601b0e4e409883680f964f4d16381ef8242dd882894b6f4f42c74c7c5bb7c33aa043c3e3dc3d20dc3a1c4d5a1e3deb7ec59fb8a3d98ecc2c28704e14607a68508394135d0e3a37e27829f339b44b0a40babe08481"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:35 executing program 1: prlimit64(0x0, 0xa, &(0x7f0000000280)={0x9, 0x40000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1632.724441] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1632.745504] FAT-fs (loop0): Filesystem has been set read-only 15:34:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8b0900"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480)=""/234, 0xea}, 0x6}, {{&(0x7f00000002c0)=@caif, 0x80, &(0x7f0000001a00)=[{&(0x7f00000007c0)=""/237, 0xed}, {&(0x7f0000000580)=""/37, 0x25}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/230, 0xfffffffffffffe76}, {&(0x7f00000019c0)=""/20, 0x14}], 0x5, &(0x7f0000001a80)=""/73, 0x49}}], 0x2, 0x40012002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @multicast1}, @mcast1, 0x40000000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1633.682350] kauditd_printk_skb: 6 callbacks suppressed [ 1633.682359] audit: type=1804 audit(1588865676.549:692): pid=19747 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1844/file0/file0" dev="loop0" ino=4874 res=1 [ 1633.764385] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.798877] FAT-fs (loop0): Filesystem has been set read-only 15:34:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4b24b2511405bcdb008e5a6389c0fbe9cd452049ffff07a6ae15d650bcfd116c3d3e3a5b14a63f86873932c5261277cbda6312b71b987d29be3bcfcf2a7cc0b82fa79d3cec9ed497d93f9898a5b1866465d58cae6fdd54000000"], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0xfffd, 0x180, 0x0, 0x40020000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1633.811344] audit: type=1804 audit(1588865676.639:693): pid=19751 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1844/file0/file0" dev="loop0" ino=4874 res=1 [ 1633.848501] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.872725] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.886710] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.898961] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.930481] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) [ 1633.953307] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 202) 15:34:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x6) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2badfa9ee9ee60c75f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1633.982367] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) 15:34:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8b0900"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1634.182764] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) 15:34:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file1\x00'}, 0x10) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x8, 0x8000) r6 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r6}) poll(&(0x7f0000000300)=[{r2, 0xa010}, {r1, 0x404e}, {r3, 0x1151}, {r4, 0x100}, {r5, 0x24}, {r6, 0x4080}, {r1, 0x6218}], 0x7, 0x7f5) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x90, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_hsr\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:hwclock_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010101}]}, 0x90}, 0x1, 0x0, 0x0, 0x24008001}, 0x20002011) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1634.430076] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) [ 1634.462400] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) [ 1634.481222] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) [ 1634.522253] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) [ 1634.549437] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 202) [ 1634.594662] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1634.611377] audit: type=1800 audit(1588865677.479:694): pid=19724 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4874 res=0 15:34:37 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1634.659328] audit: type=1800 audit(1588865677.479:695): pid=19747 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4874 res=0 15:34:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1634.701833] audit: type=1800 audit(1588865677.479:696): pid=19751 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=4874 res=0 15:34:37 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB='tranebug=0x0000000000014f8,smack,euid[\x00'/48, @ANYRESDEC=0x0, @ANYBLOB]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x8, &(0x7f0000000500)=ANY=[@ANYBLOB="b933fba878c413184ac22debac96a9dbdbb5057c9d08eefbcfb4812e618998c1238805e1d60b025bba658279800701503aa864b9ac24b550b10760250199f1b6717af4fb3879a7971b82f9bc2fcc8d3762d2cac61c645c70d8c0537ef90940dbed1360e06f2a42b8164252eb741931f12bb996a5788f09f025d09e1466eb794481e0a012b1202c4d5f350a904b6f3c5200ae8a3f23d95ae1a12be99b98215976b0b1786b6fefb5d77d977ccb2ac7a580b4eb756b4983ec2bdae6ad73222fdc6845f5fe904eef475faa58d8afdcea322cfe85463d27adcc6d216d66ed25c3429773568e95f3f810d04bf571bd3f7531a3954eb17aa384603b0d9d2838800f88916c977a9d78f639a520cbd0df6ac75e801e083166091de0472260811dead46ca3176863dbeaf0170b6e8cadfbcd93931eb21c59154865dfa2a2c86b00fd5479"], 0x1) r3 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r3}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040)={@remote, r4}, 0x14) r5 = socket$inet(0x2, 0x2, 0x0) dup3(r5, r1, 0x0) r6 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r6, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4b24b2511405bcdb008e5a6389c0fbe9cd452049ffff07a6ae15d650bcfd116c3d3e3a5b14a63f86873932c5261277cbda6312b71b987d29be3bcfcf2a7cc0b82fa79d3cec9ed497d93f9898a5b1866465d58cae6fdd54000000"], 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0xfffd, 0x180, 0x0, 0x40020000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="58a9d54a6cc34fdf4ca5506be659f8e2c6abca3cd4a24fc0ff0abb5b9f6598a5d595d2e871809c68eb1764ff86bc0b753939dd6c2be02592e852a2dab6d7d44956414bde5d83c79ba2338fef0425b41cbba39617e353afa6a94f4097c107532c59b890e31a8cd786cc3d7fe897f9765adcd358c9438d9d1535f0f0de82460c65e8bdf7c145e185983fd0b2f332a72e1bf71076f65ab36a6e50017ac10b1731937edc2a8fcaaae1d562b16f9f8719360d8dfe9b6e9c286775384d68312afe7eec1b3a7a32cad624ddfc60d9804727a8b4bec23ea6b30d75bc1431b5b6b944c4e3a3e939458628dd65808d7a6c47ec9e4bedab69f791a20e2f35c0348e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x400, 0x5, 0x0, 0x0, 0x0, 0x7, 0x200}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000b00)=""/102400, 0x8}, {&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f00000002c0)=""/198, 0xc6}, {&(0x7f00000003c0)=""/77, 0x4d}], 0x4, &(0x7f0000000880)=""/179, 0xb8}, 0x4b7d}, {{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x3}, 0x2}], 0x2, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0xa, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc5368a243ffcea5ee418ce7849ff32a33ea3fef495b8d4cfe75aa010e6bd6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000300)=""/137) 15:34:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7572656e733d76697274303030f7ffffff303030313466382c736d732233636b66736861742c657569643e5b10b55e480000000036aa000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) sched_setparam(r2, &(0x7f0000000080)=0x4) 15:34:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="004712147eea6527b2600e26902ece68f76e82ce08a2329443e30dd64deedc5efdf1245fadc1cab9118d17f13134112c03108a65bb2de5b0d2278d2249f9668c0000000000000000000000000000531b6d9508bf8dc216d165b0dbc0780c89cdbddec3c35284be2eed4d2f80205dad5fbc257fb02be7c0fcba1de3e4c51f221f0535ff15e065df8419cd0c30e9290bac1013725f234f2f1e37cd5bfda5da97ef2fbd42958ca927c2c3a29291c13cc4676e630ea9f2d565adb1a46107fd8297"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=virtio,debug=0x00000000000014f8,smackfshat=smackfshat,euid>', @ANYRESDEC=0x0, @ANYBLOB="2c00ecbd8b3108766d1086b701d7c707eb80e45a06182fc0fad01b8e8ffe78964c1e643e7ca55d5fe9fb353e76dead4d11aab15380c3751dbf42849e2f10db8506baa9795db6db608469203e7444f3a384abdd5ef7a0ebe63703c0ff1bbc22e4749fa2d680a687a9f073f32dd108f7197848d7c25976adc36cf45d17d04e269c1b81a0e041b8b935be3b01129399d5ac30bb78cc7384259944b10bf2fbf0a444c3ba13435a587a5cdf5ae3252a9f3b62d703fe678e03a284a2b3f131c88b6313b7b7aab2040eee456929d3c8af04f3cdff66c9616c8356597e41def77778d9fc63f5ed00000000000000000000ee035fab8139ceb0656f8dac79b82134c6fe9a396808fd49c4e0f4c9439b288b992fb91761ab952cb5e70633092f31fe552c8669ca7ad1357c2476740d623b32e7649c19b8467cec1746b324efdd4f5b5588"]) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1635.595115] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) 15:34:38 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000080)=""/19, 0x21d87ff1}) 15:34:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1635.995216] audit: type=1804 audit(1588865678.859:697): pid=19892 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1845/file0/file0" dev="loop0" ino=4876 res=1 15:34:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) 15:34:39 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x4, 0x20, 0x2, 0x7, 0x8, "4ab54ab908734fcd5cda2d98470ef5a7bfa52e"}) r1 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) ioctl$BLKGETSIZE64(r1, 0x40081271, &(0x7f0000000040)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000500)="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") 15:34:39 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000820400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) [ 1636.428818] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1636.447974] FAT-fs (loop0): Filesystem has been set read-only 15:34:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/211, 0xd3}, {&(0x7f00000003c0)=""/233, 0xe9}, {&(0x7f00000004c0)=""/160, 0xa0}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000001640)=""/124, 0x7c}], 0x6}, 0x13a7}, {{&(0x7f0000001740), 0x80, &(0x7f00000017c0)=[{&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000580)=""/2, 0x2}], 0x2, &(0x7f0000001800)=""/195, 0xc3}, 0x800}, {{&(0x7f0000001900)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001980)=""/151, 0x97}, {&(0x7f0000001a40)=""/30, 0x1e}, {&(0x7f0000001a80)}, {&(0x7f0000001ac0)=""/89, 0x59}, {&(0x7f0000001b40)=""/215, 0xd7}, {&(0x7f0000001c40)=""/123, 0x7b}, {&(0x7f0000001cc0)=""/181, 0xb5}, {&(0x7f0000001d80)=""/6, 0x6}], 0x8, &(0x7f0000001e40)=""/55, 0x37}, 0x1ff}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="07ee653a42e10036e0e0eb5f91c40d1a2d87e15d9c59a3bc40c21d59125167374be905428224381d0df49716d6e25310f915d12327fcec08bb5f8f2c1eec7c3126a60bd93d63000000000000000000000000000000a2fc33a4152800"], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:39 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x14f8}}], [{@smackfshat={'smackfshat', 0x3d, 'smackfshat'}}, {@euid_gt={'euid>'}}]}}) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x24, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f", [0xda, 0x80]}) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1636.773428] audit: type=1804 audit(1588865679.639:698): pid=19966 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1846/file0/file0" dev="sda1" ino=16650 res=1 15:34:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:39 executing program 5: r0 = creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d76697274696f2c64656275673d307830253030303030ac9a4ff330313466382c736d61636b66736861743d736d61636b66736861742c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x3, 0x1, 0x4, 0x200000, 0x1, {0x0, 0xea60}, {0x1, 0x0, 0x6, 0x2, 0x5, 0x1f, "c9cf6c0d"}, 0x8, 0x3, @userptr=0x1, 0xfa, 0x0, r2}) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:39 executing program 0: timerfd_create(0x9, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000080)={0x400, 0xffffffff}) shmat(0x0, &(0x7f0000db0000/0x1000)=nil, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x801, 0x84) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x94) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="791f1019", @ANYRES16, @ANYBLOB="00012bbd7000fedbdf25060000003400068008000100000000000400020008000100d90000000400020008000100ff7f00000400020004000200080001001e0d6575"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008055) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x5c, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="670200000000c20400000101"], 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x0, 0x20, 0x3}) open(&(0x7f0000000040)='./file0\x00', 0x60042, 0x0) 15:34:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x403, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:34:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1}) [ 1637.199317] loop_reread_partitions: partition scan of loop0 ([}k+NA@r' ShCΥA焟.3?I[)5EI&l)?) failed (rc=-16) [ 1637.217196] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 52) [ 1637.290658] FAT-fs (loop0): Filesystem has been set read-only 15:34:40 executing program 5: creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x220000, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d76697274696f2c1a4b6275673d3078303030303030303030303030313466382c736d61636b66736861743d716d61636b66736861742c657569643e", @ANYRESDEC=0x0, @ANYBLOB="770ef990d14fd55f2a6f415e7325931e5baa46790172581af5e51335cfe982a5bc8f2b12a9eeb9621a6f016826d043eb3aa87a89bcc282742f17f60473134567a6fd45a97b2811309c39beb9c69c6a2ff1136abd0e2c5e80d2542e36fac9982ba7beb1a530e6281c"]) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r0, 0x40081271, &(0x7f0000000040)) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x9, 0x6, 0x20, 0x1d, "c15bf0efa77d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cd492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x20, 0x1d, "c15bf01f087d9b6b2b4ef2eccc1af741994072b427e00bbc53688e43ffcea5ee418ce7849ff32e33ea3fef495b9d29359a4593f4bed6f4cc492689ec6c293f53", "2ad9fecca7cc61acea23c4f3f3fa50d96f78bb5301efaa332caf8d8b649b433f"}) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)=0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = creat(&(0x7f0000000140)='./file1\x00', 0xc) ioctl$TIOCMIWAIT(r4, 0x545c, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:34:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) memfd_create(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7336ed044b4668ccca2cb202172792d01d5f6508c3c46ad1b41f169071b98f4ba73e147043e3460861d2d6942543640733bc919adb649e547d74e12dd0d077f0a812e973c081388ba7bc89f85afbb7033a5b5d19d11aaad5da0284a5930edd1de415c472e0b5567e"], 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @mcast1, 0x0, 0x0, 0x2000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1637.642800] ------------[ cut here ]------------ [ 1637.647681] kernel BUG at fs/buffer.c:605! [ 1637.654658] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1637.660105] Modules linked in: [ 1637.663293] CPU: 0 PID: 19987 Comm: syz-executor.0 Not tainted 4.14.179-syzkaller #0 [ 1637.671238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.680579] task: ffff8880a4aea380 task.stack: ffff888089fd0000 [ 1637.686640] RIP: 0010:mark_buffer_dirty_inode+0x2d8/0x3a0 [ 1637.692206] RSP: 0018:ffff888089fd7b30 EFLAGS: 00010246 [ 1637.697626] RAX: 0000000000040000 RBX: ffff888039135000 RCX: ffffc90005b84000 [ 1637.704882] RDX: 0000000000040000 RSI: ffffffff8196cc38 RDI: ffff888039130f10 [ 1637.712187] RBP: ffff888039130db0 R08: 0000000000000001 R09: 0000000000000003 [ 1637.719437] R10: ffff8880a4aeac80 R11: ffff8880a4aea380 R12: ffff888085288c28 [ 1637.726735] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff888089fd7c80 [ 1637.733995] FS: 00007f79691e2700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1637.742202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1637.748072] CR2: 0000001b2fd21000 CR3: 0000000088129000 CR4: 00000000001426f0 [ 1637.755341] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1637.763578] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1637.770844] Call Trace: [ 1637.773430] ? fat_ent_blocknr+0xc0/0x200 [ 1637.777579] fat_alloc_clusters+0x521/0xcb0 [ 1637.781907] ? fat_ent_write+0x190/0x190 [ 1637.785969] ? __brelse+0x43/0x60 [ 1637.789402] ? fat_chain_add+0x2ae/0x550 [ 1637.789832] audit: type=1804 audit(1588865680.659:699): pid=20041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir861096780/syzkaller.ROgaNz/1847/file0/file0" dev="loop0" ino=4878 res=1 [ 1637.793458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1637.793470] ? retint_kernel+0x2d/0x2d [ 1637.793482] fat_add_cluster+0x5d/0xc0 [ 1637.831014] ? fat_fill_super+0x3010/0x3010 [ 1637.835333] ? fat_fallocate+0x237/0x2e0 [ 1637.839384] ? __sanitizer_cov_trace_pc+0x34/0x50 [ 1637.844204] fat_fallocate+0x242/0x2e0 [ 1637.848120] ? fat_cont_expand+0x280/0x280 [ 1637.852335] vfs_fallocate+0x346/0x790 [ 1637.856204] SyS_fallocate+0x4a/0x80 [ 1637.859941] ? compat_SyS_ftruncate+0x20/0x20 [ 1637.864420] do_syscall_64+0x1d5/0x640 [ 1637.868303] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1637.873468] RIP: 0033:0x45c829 [ 1637.876633] RSP: 002b:00007f79691e1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 1637.884403] RAX: ffffffffffffffda RBX: 00000000004db760 RCX: 000000000045c829 [ 1637.891656] RDX: 0000000000000000 RSI: 0000000100000001 RDI: 0000000000000005 [ 1637.898966] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.906299] R10: 000000002811ffff R11: 0000000000000246 R12: 00000000ffffffff [ 1637.913545] R13: 00000000000000ae R14: 00000000004c33e0 R15: 00007f79691e26d4 [ 1637.920801] Code: fa 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 4d 48 89 6b 58 4c 89 ef e8 62 15 aa 04 e9 20 fe ff ff e8 88 79 c3 ff <0f> 0b 4c 89 ff e8 3e ce ec ff e9 05 fe ff ff e8 34 ce ec ff e9 [ 1637.939944] RIP: mark_buffer_dirty_inode+0x2d8/0x3a0 RSP: ffff888089fd7b30 [ 1637.948271] ---[ end trace 247e6bf14f35d73a ]--- [ 1637.953037] Kernel panic - not syncing: Fatal exception [ 1637.959816] Kernel Offset: disabled [ 1637.963434] Rebooting in 86400 seconds..