e\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000102000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:10 executing program 3: shmget(0x3, 0x1000, 0x2, &(0x7f0000ffa000/0x1000)=nil) [ 2368.884464][ T6434] loop4: detected capacity change from 0 to 224 [ 2368.891842][ T37] audit: type=1800 audit(1628348170.623:220): pid=6438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=14598 res=0 errno=0 14:56:10 executing program 3: msgget(0x3, 0x8) [ 2368.968062][ T6439] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:10 executing program 0: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x42, 0x0) 14:56:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) [ 2369.076498][ T6439] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000002300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 14:56:11 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/power_supply', 0x181000, 0x121) [ 2369.457546][ T6458] loop4: detected capacity change from 0 to 224 [ 2369.725374][ T37] audit: type=1800 audit(1628348171.463:221): pid=6438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=14598 res=0 errno=0 [ 2370.262439][ T6472] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2370.281455][ T6472] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:12 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xb12}, 0x0) 14:56:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = fcntl$getown(r2, 0x9) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') 14:56:12 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r1 = inotify_init() fcntl$dupfd(r1, 0x0, r0) 14:56:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000003f00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:12 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$dupfd(r1, 0x0, r0) 14:56:12 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 14:56:12 executing program 5: get_mempolicy(0x0, &(0x7f0000000040), 0x8000, &(0x7f0000ff9000/0x7000)=nil, 0x4) 14:56:12 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system', 0x0, 0x4d) [ 2370.862535][ T6509] loop4: detected capacity change from 0 to 224 14:56:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb8) 14:56:12 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000001880)={0x0, &(0x7f0000001780)=""/246, 0x0, 0xf6}, 0x20) 14:56:12 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2370.993131][ T6514] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = fcntl$getown(r2, 0x9) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') [ 2371.090041][ T6514] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2372.039339][ T6539] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2372.051366][ T6539] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:14 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:56:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:14 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:56:14 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) 14:56:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = fcntl$getown(r2, 0x9) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') 14:56:14 executing program 3: shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ff7000/0x4000)=nil) 14:56:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x12001) 14:56:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011d80)={0x16, 0x0, 0x7, 0x7fffffff, 0x1009}, 0x40) [ 2372.638205][ T6568] loop4: detected capacity change from 0 to 224 14:56:14 executing program 5: socketpair(0x29, 0x2, 0x3, &(0x7f0000000040)) 14:56:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2372.734999][ T6573] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = fcntl$getown(r2, 0x9) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') 14:56:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x82, 0x83, 0xf, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), &(0x7f00000004c0), 0x3ff, r0}, 0x38) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b00006d6f7279202d70696473202d6d656f6f7279208072646d61"], 0x2b) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) [ 2372.832553][ T6573] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2373.881659][ T6600] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2373.894701][ T6600] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x5, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='snd_soc_jack_notify\x00', r0}, 0x10) 14:56:16 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x16) 14:56:16 executing program 5: perf_event_open$cgroup(&(0x7f00000016c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:56:16 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x120b}, 0x0) 14:56:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:16 executing program 5: socketpair(0x6, 0x0, 0x0, &(0x7f0000000780)) [ 2374.401433][ T6630] loop4: detected capacity change from 0 to 224 14:56:16 executing program 5: socketpair(0x2, 0x3, 0x0, &(0x7f0000001240)) 14:56:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0xd) [ 2374.527251][ T6634] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:16 executing program 2: socketpair(0x24, 0x0, 0x0, &(0x7f0000001a40)) 14:56:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004500000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2374.647861][ T6634] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:16 executing program 5: socketpair(0xa, 0x6, 0x21, &(0x7f0000000040)) 14:56:16 executing program 3: socketpair(0x2, 0x3, 0x1, &(0x7f0000001240)) 14:56:16 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)) 14:56:16 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2374.957319][ T6661] loop4: detected capacity change from 0 to 224 [ 2375.794120][ T6677] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2375.811653][ T6677] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:18 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00}, 0x0) 14:56:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:56:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:18 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r1}) 14:56:18 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:56:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x4}]}}, &(0x7f0000001780)=""/233, 0x26, 0xe9, 0x1}, 0x20) [ 2376.408536][ T6710] loop4: detected capacity change from 0 to 224 14:56:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f00000014c0)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:56:18 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f0000001540), 0x8) 14:56:18 executing program 2: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 14:56:18 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2376.559769][ T6718] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2376.653389][ T6718] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2377.632706][ T6741] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2377.650135][ T6741] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:19 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 14:56:19 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c}, 0x1c) 14:56:19 executing program 5: select(0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)) 14:56:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0xb) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:56:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:19 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000100)="e0", 0x1, 0x18d, &(0x7f0000000200)={0x10, 0x2}, 0x10) 14:56:19 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 14:56:20 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[{0x10}], 0x10}, 0x0) [ 2378.234818][ T6771] loop4: detected capacity change from 0 to 224 [ 2378.316342][ T6777] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:20 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x900, &(0x7f0000000040), &(0x7f0000000080)=0x8) 14:56:20 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:20 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000040)) [ 2378.483174][ T6777] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2379.464830][ T6817] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2379.482676][ T6817] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:21 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 14:56:21 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000100)="e0", 0x1, 0x0, &(0x7f0000000200)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 14:56:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000006800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:21 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="9b66927b16c9", @random="03b3a878dc8f", @val, {@ipv4}}, 0x0) 14:56:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:21 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000600)=[@cred], 0x68}, 0x0) 14:56:21 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @broadcast, @val, {@ipv6}}, 0x0) [ 2380.077500][ T6845] loop4: detected capacity change from 0 to 224 14:56:21 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000640)={0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0xd0}, 0x0) 14:56:21 executing program 2: clock_getres(0xf, &(0x7f0000000040)) [ 2380.174423][ T6851] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2380.241187][ T6851] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:22 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@random="9b66927b16c9", @broadcast, @val, {@ipv4}}, 0x0) 14:56:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000006c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2380.630424][ T6881] loop4: detected capacity change from 0 to 224 [ 2381.302529][ T6888] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2381.326057][ T6888] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:23 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 14:56:23 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000500)={0x1c, 0x1c, 0x1}, 0x1c) 14:56:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000080)=ANY=[], 0x12) 14:56:23 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) read(r1, &(0x7f0000000000)=""/194, 0xc2) 14:56:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000007400000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000280)={0x10, 0x2}, 0x10) 14:56:23 executing program 5: clock_getres(0x0, &(0x7f0000000040)) clock_getres(0x0, &(0x7f0000000000)) [ 2381.901494][ T6918] loop4: detected capacity change from 0 to 224 14:56:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:23 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x70000000) 14:56:23 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 14:56:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, 0x0, 0x0) [ 2382.054219][ T6924] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2382.134505][ T6924] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2383.116403][ T6954] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2383.128219][ T6954] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:25 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) 14:56:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000007a00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000008c0), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 14:56:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={0x0}) 14:56:25 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "5186cc2b1dfb65069381f4ae7817fb33dc0601494416ab440b1f5cd5d30b20470c9bd64e589d9ad6dd9ce0e8b44dcff6cbf0235282fc15754218b5514c0e68cc"}, 0x48, 0xfffffffffffffffb) 14:56:25 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x42380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f00000003c0)='ecryptfs\x00', 0x0, 0x0) [ 2383.604313][ T6980] loop4: detected capacity change from 0 to 224 14:56:25 executing program 3: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/249) 14:56:25 executing program 5: syz_mount_image$iso9660(0x0, &(0x7f0000004240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getxattr(&(0x7f0000000680)='./file0\x00', &(0x7f0000001700)=@known='trusted.overlay.opaque\x00', 0x0, 0x0) 14:56:25 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000008c0), 0x0, 0x0) [ 2383.673089][ T6984] Device name cannot be null; rc = [-22] 14:56:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2383.790030][ T6987] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000c0ed00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2383.835609][ T6987] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2384.083963][ T7009] loop4: detected capacity change from 0 to 224 [ 2384.844574][ T7019] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2384.856432][ T7019] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:27 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 14:56:27 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000001d80), 0x0, &(0x7f0000001e00)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffa) 14:56:27 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)={[{@uid}]}) 14:56:27 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 14:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x2, 0x8, 0x3}, 0x14}}, 0x0) 14:56:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) [ 2385.402351][ T7049] loop4: detected capacity change from 0 to 224 14:56:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)) 14:56:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000100)="3aee6163fb911e417e"}) 14:56:27 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x100000000000008, 0x288841) [ 2385.549756][ T7055] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2385.629940][ T7055] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2386.610260][ T7080] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2386.633994][ T7080] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:28 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 14:56:28 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/pm_async', 0x0, 0x0) 14:56:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffe00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:28 executing program 3: mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 14:56:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 14:56:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0008, &(0x7f0000000280)) 14:56:28 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000080)) [ 2387.248443][ T7110] loop4: detected capacity change from 0 to 224 14:56:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x2140) 14:56:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @fixed}, 0xe) 14:56:29 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/ftdi_sio', 0x0, 0x0) sendmsg$NFT_MSG_GETSETELEM(r0, 0x0, 0x0) 14:56:29 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2387.403893][ T7115] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2387.473381][ T7115] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2388.433365][ T7137] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2388.450804][ T7137] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:30 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) 14:56:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x50, 0x1, 0x2, 0x5, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}]}]}, 0x50}}, 0x0) 14:56:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000ff00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:30 executing program 2: syz_mount_image$hfsplus(&(0x7f0000001a80), &(0x7f0000001ac0)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d00)={[{@session}]}) 14:56:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:30 executing program 3: timer_create(0x3, &(0x7f0000000280)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000002c0)) 14:56:30 executing program 5: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240)={0x80}, 0x0, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={[0x3]}, 0x8}) 14:56:30 executing program 5: newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x6000) [ 2389.046065][ T7167] loop4: detected capacity change from 0 to 224 [ 2389.059025][ T7164] hfsplus: unable to find HFS+ superblock 14:56:30 executing program 3: lstat(&(0x7f0000002000)='./file0\x00', 0x0) 14:56:30 executing program 5: timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)) 14:56:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2389.158761][ T7164] hfsplus: unable to find HFS+ superblock [ 2389.223478][ T7174] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:31 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffff, 0x0) [ 2389.295681][ T7174] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2390.340590][ T7201] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2390.359513][ T7201] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:32 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 14:56:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000fff00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:32 executing program 2: syz_open_dev$dri(&(0x7f00000001c0), 0x4, 0x141200) 14:56:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0x18, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 14:56:32 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 14:56:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:32 executing program 5: syz_open_dev$loop(&(0x7f0000000100), 0x800, 0x20203) 14:56:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x34, 0x4, 0x8, 0x401, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}]}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}}, 0x0) [ 2390.995247][ T7230] loop4: detected capacity change from 0 to 224 14:56:32 executing program 5: syz_open_dev$evdev(&(0x7f0000000000), 0x1ff, 0x4200) 14:56:32 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='check=strict,map=normal,block=0x0000000000000400,map=normal,iocharset=']) 14:56:32 executing program 2: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, 0x0) [ 2391.081637][ T7235] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2391.163286][ T7235] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2392.179583][ T7259] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2392.192952][ T7259] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:34 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 14:56:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000feff00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:34 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/uevent_helper', 0xc6980, 0x0) 14:56:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000002c0)={'ip6_vti0\x00', 0x0}) 14:56:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:34 executing program 3: socketpair(0x11, 0xa, 0x3, &(0x7f0000003b00)) 14:56:34 executing program 5: mmap$usbmon(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x5) [ 2392.714573][ T7288] loop4: detected capacity change from 0 to 224 14:56:34 executing program 5: timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000002c0)) 14:56:34 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/bluetooth', 0x200200, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, 0x0, 0x0) 14:56:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000040)) 14:56:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2392.865806][ T7291] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x14, 0x0, 0x4}, 0x14}}, 0x0) [ 2392.909542][ T7291] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2393.959006][ T7317] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2393.970956][ T7317] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:36 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 14:56:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000004000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:36 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000004240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'vegas\x00'}, 0x0, 0x0) 14:56:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_MASTER={0x4}]}, 0x28}}, 0x0) 14:56:36 executing program 5: syz_open_dev$evdev(&(0x7f0000001780), 0x0, 0x151802) 14:56:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 2394.448295][ T7344] loop4: detected capacity change from 0 to 224 14:56:36 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)) lsetxattr$security_evm(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0), &(0x7f0000001880)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "8fd3410472a65f3fcf2d8db73e48e3e55a21246197312503792a38a18c83744017d768420e01c1c8f438596ad37d313b53fb66efe6fc4ac5912ad8ae"}, 0x45, 0x0) 14:56:36 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x0) 14:56:36 executing program 2: add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:56:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2394.616008][ T7352] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000008000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2394.669153][ T7352] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2394.937322][ T7372] loop4: detected capacity change from 0 to 224 [ 2395.700597][ T7381] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2395.714077][ T7381] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:37 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x36000}, 0x0) 14:56:37 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000400)='big_key\x00', 0x0, 0x0) 14:56:37 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) 14:56:37 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000001c0), &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000019c0), 0x0, &(0x7f0000001a40)={[{@shortad}]}) 14:56:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:37 executing program 5: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x2857048, &(0x7f0000000140)) [ 2396.200704][ T7408] loop4: detected capacity change from 0 to 224 [ 2396.239127][ T7406] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found 14:56:38 executing program 2: syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x840) 14:56:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2396.325329][ T7416] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2396.333999][ T7406] UDF-fs: Scanning with blocksize 512 failed 14:56:38 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b7"}}, 0x119) 14:56:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000ffff1f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2396.380511][ T7406] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2396.398403][ T7416] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2396.431907][ T7406] UDF-fs: Scanning with blocksize 1024 failed [ 2396.450798][T18934] hid-generic 0000:0000:0000.0002: item fetching failed at offset 0/1 14:56:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801}, 0x14}}, 0x0) [ 2396.476203][T18934] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 [ 2396.501895][ T7406] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2396.577899][ T7406] UDF-fs: Scanning with blocksize 2048 failed [ 2396.659629][ T7441] loop4: detected capacity change from 0 to 224 [ 2396.671470][ T7406] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2396.693214][ T7406] UDF-fs: Scanning with blocksize 4096 failed [ 2397.634417][ T7455] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2397.652819][ T7455] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:39 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x600300}, 0x0) 14:56:39 executing program 2: socketpair(0x26, 0x5, 0x20, 0x0) 14:56:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x78}}, 0x0) 14:56:39 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000001c0), &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000019c0), 0x0, &(0x7f0000001a40)={[{@shortad}]}) 14:56:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffff0000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x18, 0x0, 0x1, 0x801, 0x0, 0x0, {}, [@generic="aa"]}, 0x18}}, 0x0) [ 2398.212948][ T7482] loop4: detected capacity change from 0 to 224 [ 2398.250433][ T7484] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2398.251891][ T7487] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 14:56:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)={0xec4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@typed={0xead, 0x0, 0x0, 0x0, @binary="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"}]}, 0xec4}}, 0x0) 14:56:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000001b40)={&(0x7f0000001a40), 0xc, &(0x7f0000001b00)={&(0x7f0000001a80)={0x14, 0xc, 0x6, 0x201}, 0x14}}, 0x0) 14:56:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2398.306547][ T7488] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2398.334282][ T7484] UDF-fs: Scanning with blocksize 512 failed 14:56:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000010000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:40 executing program 5: timer_create(0x3, 0x0, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000080)) [ 2398.388937][ T7484] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2398.404771][ T7488] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2398.465972][ T7484] UDF-fs: Scanning with blocksize 1024 failed [ 2398.532192][ T7484] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2398.602900][ T7484] UDF-fs: Scanning with blocksize 2048 failed [ 2398.678332][ T7484] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2398.688466][ T7513] loop4: detected capacity change from 0 to 224 [ 2398.741195][ T7484] UDF-fs: Scanning with blocksize 4096 failed [ 2399.487540][ T7524] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2399.499395][ T7524] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:41 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 14:56:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14, 0x13, 0x1, 0x801}, 0x14}}, 0x0) 14:56:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev}, @FOU_ATTR_PEER_PORT={0x6}, @FOU_ATTR_AF={0x5}, @FOU_ATTR_AF={0x4bff946179849096}]}, 0xfe35}}, 0x0) 14:56:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000020000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:41 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000001c0), &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000019c0), 0x0, &(0x7f0000001a40)={[{@shortad}]}) 14:56:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x3}, 0x14}}, 0x0) 14:56:41 executing program 5: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 2400.050200][ T7554] loop4: detected capacity change from 0 to 224 [ 2400.080074][ T7550] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found 14:56:41 executing program 5: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) 14:56:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2400.146441][ T7550] UDF-fs: Scanning with blocksize 512 failed [ 2400.162096][ T7558] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000340), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, 0x0) [ 2400.208800][ T7550] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2400.230824][ T7558] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000030000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2400.289621][ T7550] UDF-fs: Scanning with blocksize 1024 failed [ 2400.350928][ T7550] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2400.427475][ T7550] UDF-fs: Scanning with blocksize 2048 failed [ 2400.490742][ T7550] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2400.526284][ T7577] loop4: detected capacity change from 0 to 224 [ 2400.554284][ T7550] UDF-fs: Scanning with blocksize 4096 failed [ 2401.317902][ T7587] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2401.329924][ T7587] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:43 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:56:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x0) 14:56:43 executing program 5: execveat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x1000) 14:56:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000040000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:43 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$udf(&(0x7f00000001c0), &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000019c0), 0x0, &(0x7f0000001a40)={[{@shortad}]}) 14:56:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', 0x0}) 14:56:43 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) [ 2401.877024][ T7616] loop4: detected capacity change from 0 to 224 [ 2401.932078][ T7614] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found 14:56:43 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000004240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0xa02012, 0x0) 14:56:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4020, &(0x7f00000002c0)) [ 2401.992409][ T7619] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2402.032700][ T7614] UDF-fs: Scanning with blocksize 512 failed [ 2402.069698][ T7619] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:43 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mmap$usbmon(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 2402.123153][ T7614] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2402.174532][ T7614] UDF-fs: Scanning with blocksize 1024 failed [ 2402.291965][ T7614] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2402.348330][ T7614] UDF-fs: Scanning with blocksize 2048 failed [ 2402.424319][ T7614] UDF-fs: warning (device loop3): udf_load_vrs: No VRS found [ 2402.469218][ T7614] UDF-fs: Scanning with blocksize 4096 failed [ 2403.164158][ T7647] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2403.181782][ T7647] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:45 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:56:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000050000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:45 executing program 5: syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) 14:56:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 14:56:45 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f0000000000)) 14:56:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000001b80), 0x4) 14:56:45 executing program 5: setresuid(0xee01, 0xee01, 0x0) [ 2403.757620][ T7675] loop3: detected capacity change from 0 to 128 [ 2403.769798][ T7674] loop4: detected capacity change from 0 to 224 14:56:45 executing program 5: r0 = getgid() setresgid(0xee01, 0x0, r0) 14:56:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000002a40)={0x0, 0x3938700}) 14:56:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2403.893481][ T7681] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2403.904001][ T7675] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 14:56:45 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x0) write$FUSE_POLL(r0, 0x0, 0xffffffffffffff16) [ 2403.979262][ T7681] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2404.020698][ T7675] loop3: detected capacity change from 0 to 128 [ 2404.083528][ T7675] isofs_fill_super: bread failed, dev=loop3, iso_blknum=32, block=64 [ 2405.083461][ T7712] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2405.100582][ T7712] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2405.305833][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 2405.312413][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 14:56:47 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) 14:56:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000060000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:47 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 14:56:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:47 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom(r0, &(0x7f0000000000)=""/213, 0xd5, 0x0, 0x0, 0x0) 14:56:47 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system', 0x94800, 0x54) 14:56:47 executing program 5: r0 = epoll_create(0x4) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) [ 2405.681367][ T7741] loop4: detected capacity change from 0 to 224 14:56:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = getuid() newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r0, r1, 0x0) 14:56:47 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f0000001240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80) 14:56:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000070000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2405.801942][ T7747] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2405.839116][ T7747] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:47 executing program 5: getgroups(0x1, &(0x7f0000001000)=[0xee01]) setresgid(r0, 0x0, 0xee00) [ 2406.064349][ T7763] loop4: detected capacity change from 0 to 224 [ 2406.990499][ T7778] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2407.010425][ T7778] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:49 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:56:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:49 executing program 3: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000140)=""/4096, 0x1000) 14:56:49 executing program 5: syz_open_dev$evdev(&(0x7f00000002c0), 0x401, 0x117240) 14:56:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000080000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:49 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @dev, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "c0f5a0", 0x20, 0x0, 0x0, @local, @dev, {[@hopopts={0x0, 0x3, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @jumbo]}]}}}}}, 0x0) 14:56:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') lseek(r0, 0xfffffffc, 0x4) 14:56:49 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000040)={@local, @dev, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "c0f5a0", 0x48, 0x0, 0x0, @remote, @dev, {[@routing={0x0, 0x8, 0x2, 0x3f, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}]}]}}}}}, 0x0) [ 2407.587191][ T7807] loop4: detected capacity change from 0 to 224 14:56:49 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x3e9]}, 0x8}) 14:56:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:49 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @dev, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "c0f5a0", 0x0, 0x32, 0x0, @remote, @dev={0xfe, 0x80, '\x00', 0x3b}}}}}, 0x0) 14:56:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000001680), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 2407.761382][ T7815] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2407.823660][ T7815] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2408.823899][ T7841] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2408.846691][ T7841] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:51 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 14:56:51 executing program 5: r0 = openat$full(0xffffff9c, &(0x7f0000000700), 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 14:56:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000090000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:51 executing program 3: add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="e4", 0x1, 0xfffffffffffffffd) 14:56:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000100)={0x18, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@nested={0x4, 0xb}]}, 0x18}}, 0x0) 14:56:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) 14:56:51 executing program 5: syz_emit_ethernet(0x3a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaafb0180c2000000810000000800450000285c261f"], 0x0) [ 2409.436049][ T7869] loop4: detected capacity change from 0 to 224 14:56:51 executing program 3: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x20c00) 14:56:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:51 executing program 5: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ae", 0x1, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000440)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0) 14:56:51 executing program 2: syz_emit_ethernet(0x38, &(0x7f00000001c0)={@empty, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "87e773", 0x2, 0x0, 0x0, @empty, @private1, {[], "9a6c"}}}}}, 0x0) [ 2409.623398][ T7876] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2409.690933][ T7876] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2410.659843][ T7902] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2410.674882][ T7902] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:52 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 14:56:52 executing program 5: mq_open(&(0x7f0000000400)='a,C\xb5\xbfa\'\xc8O?$\xbf\ac}\xc1\xac\x9cP\x1bo\xb0\xd5\xf4W|_0\xd3\xd6\xb1.\x9cR\xa3\xb7\x1b\t\xe5]\x9c\x8aa\xd3A \xc9\xdd\x11q\x9e\xfe\xd8-Y\xb7\xe9\xb3\xec\xf8K\xaf&\x12N\xda\"\x8f\xb4\x89\xef\xc8O\x15\xd14\r\xbe}\x92\x83\x1e\x80\xbf\xa6B\xc6\xb0s\xee\xa19\xc0\v\xca#\xc9k\xe3|U\xfa\xe9O\xbf\x9b\xcf\n_>\x16\xba\xae~hX-6\x99[\xfc5\xb0\xe8\v\n\xd6\xf3SI\xc0&\xf7L\x94Sl$\xa8\xa5\x03\x1d\xe6]\x13\x1b\x95\x06OrG\xa0\xec\xd4\xc6\x9b,!Jp\xb0\x86}\xcb\xaf\xce{A\a\xd49_\xad,\x87\x11v\xcca\x04n:L\x81G\x9e\x05\xf4.\x89\xb5(+V\xc6\x10\xfb\xfa*\xe15\x06p\xe0\x01{,\xda\x97V@\x97\xd4\xa9\xa7-\xf9 xEKJy\xbf\xdf\xdf_w\x12\x04B\x89\x83\xc4t\xfd\xe25r\xa8\xf0\xcb\xb6A\x9b\xb0\x17\x19G\xd1\x1dr\xc6k\xf7\xbb\xbbM=\xb1a\xeb\xc3\xfe\xd6e\x94\x97\x88 r\xaa[\x88\x8f\xfa\x836\xab\xf6\xd2\xa5\xee\x94*`|c\xffI\x16\xdf\x88{\xc0`m\xe4\x1c\xa8\x04\x02\xab\xff\x82(\xb4\f\xebp\xf8\x98\xce9\xf6%v5\x88v\x10\xb1q\xd9\xb6\x12\xf1\xef\xb9\x85\xdeV{x\xb5O\x95\xc1\xa5\xf78\x855\x9aTwJ\xd1K\xf74\x01f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\xd4\xcd\x9a\xef\x17\x19\xe4k%i4\xf79Q\xc9sY\xe6\xf9z\xd3\xbf\xbcT\x86\x98D\x1d\xa5g_3\xe4H\xf7\x8e4\xa8\xe7\xed\xc0\xc3+3|qZ+f\xf9\xdf\x11=Em\xe9v0v\'\xfb\xe3\x00\xde\x1a\xd6\xe2\xfb\x19\x00X\x90%\xc8\x1e\xf5q\x9e\xfd\x06\x19\xcbw\b\xd5K\xc0M\x8f\xdc\xd5\x04\xe4\xff\x9e\xbc\x87-\xfc\xa1W\x84\x89\xba\x17L\x11\xa1\x11w\x1c\x06\xb7 \xce\x8a\x03i\xca\x05\xc6yr\xd5Y\x03/\xd3:\xd2#\t\x80gJc\xb2,\xd2\x98\xbf\xb5X@\x17\x1e\xe3V\x1e\x1d6\xe8/g\xb73\xec\xe2\xa2Nx\x90H\x89\x05!\xb7\xc9\x85\x11\x1f\xf5\n{\x88jK\x8c\xfe\xb5lq\xa9\xa6\x1f\xaa\xfec\x11\xc1\xa60\x82s\xbdM_\xcf\xedh\xe2$\x90\x87\"\n\x97\xe3\x01\'>\xfc\x88\xf8\x00\x8f/}\x816hG\x80]\xe4\rkY\xeeE\x00\x00\x00\x80j\xb0k\x11\a\x9d3\xb2\x88\xc9\xb1\x02\x0e\x11\xe9\vF\xb6\xc0{K[a\xa4\v\xdez\x125O\x83\x1dg9\xed\x146\fw\x00~\xcc\x13\xf8\xf7\xdb\x11\x18\xf7-\x03\x01276\x14\x83\x0e\x89\x98\xa3|lR\xd8\x96\x8aA+\xe3\xd0[\'\xa570`\xa5b%6\xceh7\xc9\xbba1;\x9f\xfeRi\xcf\x86,\x0fw&r=\xf7\xb0@6\x97\xc0{[6%-\x8aq\xb01\xda\xd9b\xc2n\x11\xde\x82\x195\xc2\x93Y7\x12b\xa1$\x80n\xf6\xa3),\x95\xf8\xc8.\xba\x01\xd1\xdc\xc2\xf1\xe7\xa3o\x9b', 0x0, 0x0, 0x0) 14:56:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000a0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:52 executing program 2: socketpair(0x2, 0x0, 0xfffffffa, 0x0) 14:56:52 executing program 3: openat$full(0xffffff9c, &(0x7f0000000140), 0x1030e1, 0x0) 14:56:52 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x7, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, 0x0) 14:56:53 executing program 5: syz_emit_ethernet(0x15, &(0x7f0000000000)={@link_local, @link_local, @val={@void}, {@llc={0x4, {@llc={0x0, 0x0, 'E'}}}}}, 0x0) [ 2411.301910][ T7935] loop4: detected capacity change from 0 to 224 14:56:53 executing program 5: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 14:56:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 14:56:53 executing program 3: timer_create(0x0, &(0x7f0000000800)={0x0, 0x0, 0x1}, &(0x7f0000000840)) timer_gettime(0x0, &(0x7f0000000780)) 14:56:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2411.403611][ T7943] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2411.502054][ T7943] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2412.498950][ T7974] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2412.517553][ T7974] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:54 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) 14:56:54 executing program 5: openat$tun(0xffffff9c, 0x0, 0x410880, 0x0) 14:56:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:54 executing program 2: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) bind$unix(r0, 0x0, 0x0) 14:56:54 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) poll(&(0x7f0000000100)=[{r0, 0xd4}, {r0, 0x80}, {r0, 0x4}], 0x3, 0x0) 14:56:54 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0) 14:56:54 executing program 5: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) linkat(r0, &(0x7f0000000680)='./file\x00', 0xffffffffffffffff, 0x0, 0x0) [ 2413.123289][ T8006] loop4: detected capacity change from 0 to 224 14:56:54 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 14:56:55 executing program 5: select(0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000100)) 14:56:55 executing program 2: io_setup(0x2fe, &(0x7f0000000080)) 14:56:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2413.274713][ T8013] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2413.360912][ T8013] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2414.410153][ T8040] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2414.424858][ T8040] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:56 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) 14:56:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000d0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:56 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:56:56 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000c34000/0x4000)=nil, 0x4000) mprotect(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) munlock(&(0x7f0000b02000/0x4000)=nil, 0x4000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000a40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40], [0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x324]}, 0x45c) shmget(0x2, 0x3000, 0x0, &(0x7f0000bbf000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0xe) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x0) munlock(&(0x7f0000e8c000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000340)=""/169) clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x6, 0x6, 0xa9, 0x0, 0x100000000, 0xb93ac983d26a01e5, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2eeeae98, 0x2, @perf_config_ext={0x5, 0x2}, 0x0, 0x8000, 0x1, 0x9, 0xdace, 0x642, 0x1, 0x0, 0x8, 0x0, 0xbf7c}, 0x0, 0x6, r0, 0x9869dbe578950b3e) 14:56:56 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2415.068002][ T8072] loop4: detected capacity change from 0 to 224 14:56:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2415.165582][ T8075] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:57 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:57 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2415.293401][ T8075] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2416.300297][ T8113] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2416.321903][ T8113] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:56:58 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) 14:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:56:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000f0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:56:58 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000c34000/0x4000)=nil, 0x4000) mprotect(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) munlock(&(0x7f0000b02000/0x4000)=nil, 0x4000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000a40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40], [0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x324]}, 0x45c) shmget(0x2, 0x3000, 0x0, &(0x7f0000bbf000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0xe) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x0) munlock(&(0x7f0000e8c000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000340)=""/169) clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x6, 0x6, 0xa9, 0x0, 0x100000000, 0xb93ac983d26a01e5, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2eeeae98, 0x2, @perf_config_ext={0x5, 0x2}, 0x0, 0x8000, 0x1, 0x9, 0xdace, 0x642, 0x1, 0x0, 0x8, 0x0, 0xbf7c}, 0x0, 0x6, r0, 0x9869dbe578950b3e) 14:56:58 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:58 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2416.982127][ T8148] loop4: detected capacity change from 0 to 224 14:56:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2417.104790][ T8158] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:56:58 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:56:59 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:56:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2417.269551][ T8158] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2418.817407][ T8192] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2418.836658][ T8192] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:01 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xb120000}, 0x0) 14:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000100000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:01 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:01 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000c34000/0x4000)=nil, 0x4000) mprotect(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) munlock(&(0x7f0000b02000/0x4000)=nil, 0x4000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000a40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40], [0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x324]}, 0x45c) shmget(0x2, 0x3000, 0x0, &(0x7f0000bbf000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0xe) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x0) munlock(&(0x7f0000e8c000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000340)=""/169) clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x6, 0x6, 0xa9, 0x0, 0x100000000, 0xb93ac983d26a01e5, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2eeeae98, 0x2, @perf_config_ext={0x5, 0x2}, 0x0, 0x8000, 0x1, 0x9, 0xdace, 0x642, 0x1, 0x0, 0x8, 0x0, 0xbf7c}, 0x0, 0x6, r0, 0x9869dbe578950b3e) 14:57:01 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2419.523511][ T8224] loop4: detected capacity change from 0 to 224 14:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:01 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000950000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:01 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2419.762738][ T8230] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2419.844339][ T8230] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2420.814612][ T8257] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2420.833938][ T8257] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:03 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 14:57:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000110000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:03 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:03 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000180)={0x240080, 0x1, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x45, 0xda1, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x0, 0x7, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0600"}, 0x0, 0x2, @planes=&(0x7f0000000080), 0x96000}) 14:57:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000950000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2421.423599][ T8287] loop4: detected capacity change from 0 to 224 14:57:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180200001000000000000000004900088500000041000000950000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:03 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2421.628809][ T8292] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:03 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'virt_wifi0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6c) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}}, 0x0) [ 2421.717587][ T8292] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2421.950625][ T8313] device macvtap1 entered promiscuous mode [ 2421.984097][ T8313] device virt_wifi0 entered promiscuous mode [ 2422.022101][ T8313] team0: Device macvtap1 failed to register rx_handler [ 2422.094057][ T8313] device virt_wifi0 left promiscuous mode [ 2422.779034][ T8325] device macvtap1 entered promiscuous mode [ 2422.798257][ T8325] device virt_wifi0 entered promiscuous mode [ 2422.808940][ T8325] team0: Device macvtap1 failed to register rx_handler [ 2422.817403][ T8325] device virt_wifi0 left promiscuous mode [ 2422.910276][ T8323] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2422.923841][ T8323] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:05 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f000000}, 0x0) 14:57:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000180000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:05 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4689950e"}, 0x0, 0x0, @planes=0x0}) 14:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2423.535584][ T8359] loop4: detected capacity change from 0 to 224 14:57:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:05 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x6, 0x4) 14:57:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2423.693042][ T8363] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2423.768204][ T8363] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2424.822548][ T8389] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2424.841799][ T8389] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000001f0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:07 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000100000000000000000490008850000004100000095000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:07 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 14:57:07 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getpeername$inet6(r0, 0x0, 0x0) 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2425.537003][ T8418] loop4: detected capacity change from 0 to 224 14:57:07 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:07 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x80044d10, &(0x7f0000000040)) 14:57:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2425.682045][ T8420] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2425.746950][ T8420] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000200000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:07 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2426.081887][ T8456] loop4: detected capacity change from 0 to 224 [ 2426.972501][ T8479] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2426.989801][ T8479] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:09 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) 14:57:09 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f0000000100)) 14:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:09 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000010200000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2427.628613][ T8507] loop4: detected capacity change from 0 to 224 14:57:09 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:09 executing program 2: mq_unlink(&(0x7f0000001080)='/-:\x00') 14:57:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:09 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2427.812449][ T8512] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2427.873930][ T8512] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2428.942187][ T8541] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2428.959293][ T8541] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:11 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x48000000}, 0x0) 14:57:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000230000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 14:57:11 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:11 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2429.634820][ T8568] loop4: detected capacity change from 0 to 224 14:57:11 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000280)={0x0, 0x5, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "244707de"}, 0x0, 0x0, @userptr}) 14:57:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:11 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:11 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2429.826647][ T8575] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2429.897756][ T8575] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2430.896018][ T8600] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2430.914511][ T8600] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:13 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0) 14:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000003f0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:13 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0xa80, 0x0) 14:57:13 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2431.564371][ T8626] loop4: detected capacity change from 0 to 224 14:57:13 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000001340), &(0x7f0000001380)=0x4) 14:57:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:13 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:13 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2431.741939][ T8634] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2431.811671][ T8634] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2432.852092][ T8659] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2432.872845][ T8659] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:15 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 14:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000400000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:15 executing program 2: socket(0x29, 0x2, 0x8) 14:57:15 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2433.575796][ T8689] loop4: detected capacity change from 0 to 224 14:57:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x13, &(0x7f0000000000)={{{@in=@empty, @in=@remote}}, {{}, 0x0, @in6=@empty}}, 0xe8) 14:57:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:15 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2433.709477][ T8693] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2433.817120][ T8693] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2434.904357][ T8720] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2434.924200][ T8720] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:17 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x68000000}, 0x0) 14:57:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000430000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:17 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x1010c0, 0x0) 14:57:17 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:57:17 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2435.634040][ T8749] loop4: detected capacity change from 0 to 224 14:57:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:17 executing program 2: openat$mixer(0xffffffffffffff9c, &(0x7f0000000280), 0xc002, 0x0) 14:57:17 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) [ 2435.841407][ T8756] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2435.932328][ T8756] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2437.040097][ T8781] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2437.057173][ T8781] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:19 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 14:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) 14:57:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000450000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x2b, 0x0, 0x0) 14:57:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) 14:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 2437.779104][ T8815] loop4: detected capacity change from 0 to 224 14:57:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:57:19 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a1053f6b"}, 0x0, 0x0, @planes=0x0}) 14:57:19 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2437.922187][ T8819] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 2438.002244][ T8819] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2439.006419][ T8844] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2439.018060][ T8844] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:21 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:57:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:57:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000480000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, @none}, 0x8) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001800)=[{{}, 0x6e}, {{}, 0x6e}, {}], 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 14:57:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:57:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 2439.702107][ T8876] loop4: detected capacity change from 0 to 224 14:57:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:57:21 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2439.836428][ T8880] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2439.901695][ T8880] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000004c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2440.275986][ T8900] loop4: detected capacity change from 0 to 224 [ 2441.067081][ T8909] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2441.083939][ T8909] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:23 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 14:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:23 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000680000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, @none}, 0x8) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001800)=[{{}, 0x6e}, {{}, 0x6e}, {}], 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 14:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2441.648960][ T8941] loop4: detected capacity change from 0 to 224 14:57:23 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2441.783432][ T8944] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2441.855585][ T8944] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2442.894564][ T8971] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2442.914179][ T8971] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:57:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000006c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:25 executing program 3: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:57:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:57:25 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 14:57:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, @none}, 0x8) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001800)=[{{}, 0x6e}, {{}, 0x6e}, {}], 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 14:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 14:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 2443.518137][ T9002] loop4: detected capacity change from 0 to 224 14:57:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 14:57:25 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, 0x0, 0x0) [ 2443.627240][ T9005] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYBLOB="fbdbdf"], 0x50}}, 0x0) 14:57:25 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2443.699681][ T9005] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000740000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)={0x2, 'vlan1\x00'}) 14:57:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x3, 0x10032, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:57:25 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, 0x0, 0x0) [ 2444.032589][ T9032] loop4: detected capacity change from 0 to 224 [ 2444.869634][ T9044] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2444.893177][ T9044] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:27 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 14:57:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xb6, &(0x7f0000000140)="f43970da7cfeb6d42fd54103666c5762306aa60696c2a76e59b65fa78fb184da006cabbd4ef89083bfc0c54f4a36f76525580c72249ad30d364f60b87a982a8066b10f8b405046e84785185abde7d01894a79025a799ce0761bdf0c91d32be1ce159a94b4fdfbcacf0996042e95f3ad9e6ef50a0b8336d3518bcc404a6cb7f8e9e431af7dfed8d920ebf89b5367d52dc0b9c8a60eedc7e2263914426f2d3e8039962a9c782c1c3bf442e6f9c253ef9d62faed96cc988"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:57:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES16=r1, @ANYRESDEC], 0x6db6e559) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x9) 14:57:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000007a0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:27 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, 0x0, 0x0) 14:57:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, @none}, 0x8) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001800)=[{{}, 0x6e}, {{}, 0x6e}, {}], 0x3, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 14:57:27 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0), 0x8}) 14:57:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x4}}, 0xe8) [ 2445.488888][ T9077] loop4: detected capacity change from 0 to 224 14:57:27 executing program 5: syz_mount_image$squashfs(0x0, &(0x7f0000004e00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x28800, &(0x7f0000002f80)) 14:57:27 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000), 0x0) 14:57:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES16=r1, @ANYRESDEC], 0x6db6e559) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x9) [ 2445.636274][ T9084] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)={[{@sbsector}]}) [ 2445.711369][ T9084] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2445.858776][ T9098] ISOFS: Unable to identify CD-ROM format. [ 2446.769114][ T9111] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2446.783225][ T9111] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:29 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 14:57:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000ffffff8c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:29 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000), 0x0) 14:57:29 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 14:57:29 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES16=r1, @ANYRESDEC], 0x6db6e559) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x9) 14:57:29 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000002600), 0x0, 0x0) 14:57:29 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_create(0x0, 0x0, &(0x7f0000000280)) timer_delete(0x0) 14:57:29 executing program 5: pipe2$9p(&(0x7f0000000040), 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/crypto\x00', 0x0, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000001380)) [ 2447.417248][ T9144] loop4: detected capacity change from 0 to 224 14:57:29 executing program 5: clock_gettime(0x0, &(0x7f00000045c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004680)) [ 2447.491839][ T9147] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:29 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x4}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES16=r1, @ANYRESDEC], 0x6db6e559) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x9) 14:57:29 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000), 0x0) 14:57:29 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 2447.594525][ T9147] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2448.657803][ T9178] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2448.680104][ T9178] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:30 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:57:30 executing program 2: getgroups(0x1, &(0x7f0000004d40)=[0xee00]) 14:57:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000edc00000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:30 executing program 5: sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) getitimer(0x0, &(0x7f0000000780)) 14:57:30 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003640)={&(0x7f0000000480)={0x1b84, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x1b6d, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}, @typed={0xb, 0x0, 0x0, 0x0, @str='%{#][)\x00'}, @generic="91cce42b4113ce22c4e226a0b6151f1dc27d378fd750a16e7d786fd1aba627dc5f9f5625449fa52cd6de7238e02bb1154fda816c5e0ba8204b45d5b0eba84fcdb350c36a8e3fdab8659df8f13ee665e9ec8e70e6264fc3531e84303c4d7f2e9c647b71a6ed908c1f03bd81f307100ee88ce7b2b8fe4f8845d8a74b434bb71a3e3b9f5c4a5e92a5749443e78600c01820b2dd51fd3179130bd2aaaaeeb7f505e931933e1353b35b285d7e5847c9eb6843fe94cea861c2e1f81ec470964d57b3fcf5fbbe75d15e003b6643a30044f75b9176c7f0998c745cca807a6891169b2906ab257ee7ffd70e68c2da1a5655ffd04f457e145b6cc4a4788cd3b1b3ab8bb1cee9d8e2ec4c6dddb28fc678ab01a92fb52497a26ae1b173cb2da80225f4e7374f2419217dc07afb15eea40e534d5028cd784733e803a49b24aeb0131fbfb49d389484c1dc5ea997d5d733e613e6cf741830f75afac88d60165880c1ae4111eae4089a6c75e50c286933e7da48082206c9ed7ad7a73e3325480a9baded79a2079dafbcf6842c3edcc997447a3755e434af6ca3db0daf3d346e4ee48dec744d6329c73fc5ca912773f9a172a808987e246b6490b6944fa5a039173355795e699677af12805ada9b545f1cf435bcb8ca3bdd4a283d597bcbdfa1b478e98c91cc233ca2ff104c4e41391f87e96d869a3d9db4e8b9d84eacc0242ee7ad5332943d01f3d1ea66b1c8bc46816751b2dca41b8c2e366d25e864a154f055fc6158f04fb9d5d7e60ba9d49efe391ce3a3ef11cbf52a47170096031cd6ea6532df36d65143dd1d46b5f4db1ce9f14623515cbace883d2b6da88f5627ab4fd0a63e4ea6e94c06e414229b0d97af24f97f2177c4602ead623f2943c6877aa5e2a2b986ee30ff656843a01b47e45ffb277cd38d182ab8577730285490d55e270f6cf466dfa5b2e8ff2f0e694c89f59a0b46d6ccd3d9374fb73725ec19547a927dd1aff587c71b88e6d636a425dcc5a3f799265d896d51235e61cb7eaa63e12d0767388173d308777da6729cec203f73e49cfee94da9ecd619f4fc41c5614d0cca31d8247ca026ce4726cc2b0107e881ac3ff41d1dfc80ff889f93c774a9b46445d8e8003458188229f5e2f74764ddbb33f8fca5504ce12f9cc880981d31697fb38574ba8a3bd2a04fc6ff006d118599c580883435a6a0885c31a122b97f9476c5f7d6fce76b9c72160e5af4fc33da3b1548513ff7d69f719d867e044d8162ddccfca4165ffbb053c783bce9bdc19d684af1f606d617fe77ac9b2ca3c0e2080eab3b9b9341b5624cdb380d86fe27aa355af580db3654bde2e05a2ad6f7aca04e1acdf518ddbebe3fe924ad0bf842beae7a581ab8178e900903be7d75d84a24d03fa4869fff910a00df55e6f8bc862c7871829e8d66a882741b58b322d9208e8e5871887336b0d2b415dfbe8e69395bee7e723a71a3a00b8b5efebb1cd1a14100b401b95386b374301208fa6e63c809d0587b94a0ca703662ab674e5ec3260591341d858e727488832fac14ceda5651f169210b0ef728f0ba5a2714abc191406d4618b21c71369a7273c2e36adeff01fcc778d47b187499d3df3cf6be955123303777a1418fb0ab7758a92f53a24cba7fc070ecb6e15525f76ac719c00694ab039a2927cc5719f51cbe629008bfa9d34e32fc975561caf38eba83c863adaa777adb994327c4825aa1f603f6386da7d19acd3b45b9780b6b207e1367739273e8a05033df09e917f3f94ca3d9c45938454c4c12329ecab7e9823007aa76cd1bad3ce565e87e32189182a42ac200abcfba9ad52e3d5c4c6d008aeb3bcbd7e3e4ccd9c02e67c239be29f26195a3e0f896453899db5e43c0d8d7d392de87a4d144f6113891fd0874d3e8b3081e033a7e0399ea2d3207d2375e4ba2772cedda2f27631b23414587ae1ef637e0265316b3aa13ecad3a36cf19f2362212068a5714936347d4b07808d430f6c3c8c2343e22720d5729341df28d70e0473fd8424d850ccc6e04342a76f1b4f575be69c886d18b2d7084225e5c73f8a2514d60844988531f994608f97fc0fd3c099c1477c59688e58dc32dd83bfd63f3f828750743b9d0849e967251a4b5285f32a33bfd253530dc3391473ab520e78fa094784799a66247f187e8a674542c04c4bb3e8ea99e7751073266401ed2f0fa71dccf00b9ad4c1dd567cb461b1a0badeaaf9946c41aa1924632dbe77f50cac72db0de0b7c2b1d6684dc1f7a5ed5cbd8b62978d6442bfebd6793d61f63b0f648030cbc40dd5b0d91f25bb6a63d830a12618135ba57148a16e28e5db3e928baa955369b4324b8f4aac7ee668ebd838d22492b0c74ed201d64bcc3695043780a93a12b1620f76428044175aec28f6716f40ff454a61da4d6fd358f1043219fe26e509dd214891811f87389363fd0930d6a151331ca63488950e7111a8412f45ad01c4593d30d17bab81d05646f68eca8db4ba258c8aa907450440f822833f9db20c9fabcfb03b9e134765db81392cf16034d03248106437ab179ee1f3d073f47babf4784a13c5315f22ca1758d05a12c92f074d3076e607fe6ea10ac85bf27862b2cfd170dd9370241e37a11e4d09743c314d08aa265b57069b3970fbe4516be4d09bdd3eea35fd83aa3cc7b54527b4179ed2dcebdecac15a867219912f3ab8395fe9d4c0d9d3be063d710f61feca752ac0aebd97c3cbbfe2d44a34caa4e955a61b427b2b14632162e9c4dc071c41761bd9cc02f519ffafe1231747c81faeeb2b86c3ce22fd64407f22077d598f24096194f77f0e9c8342bfea6aec00658c3c92f7c1c9d89def6abd1259789235842eb1e99df79d1f6802412e1522256fdd8ccf01b24e4a64db65ce2547939f91ae7ef50de32c343cd8fe752b899bb15878b716751ad876d095a6313f782e89ffe057c5157d4bf4938c439a3b55a79b18b699525ba657c16c03fe51e7d5c62513ae886b9ce68fb3c430a1335d32ab5c605b826e4578d172449c7fc62f09b3d8313711b8209474b7d8c1bb0e06c0a0d9a264275b356bc2e876a38c9eb0f3268b52dfe596d4498e410283fce2795b2f8766fb66f7f5de9f756a75922820a631eab7f196e118a2dfdf6dc44f07dc1726d2322bb5f64c958000cacac8bf06ee71ab9040501143aa2f63943615be9817e2bbec1ade9ec50eaba15a1bcdff3ec0c3c7e8ae6e5125a89918baafc5a68958ee8cd9c62d68d4aaf0071361e8466879015b1be13cddce470ca014a24b4927265bd5b98fc553fedb1474d5cdf885adceed98ca894f6877b8378ebb693aa4a241107fa9359d59897eaa7cd61f27c57a819c9e29d3444e1c7132e26a7348f292dff85954b15094fb48b63fef6243e8a928b3e48951bbc73e77c0e1e67c378755110d945c25a2cdaca8de988d0a20ddd81e298123c53d4652829c39de8e91fb4fbbcb727dcb329856b5ba6bd482a80b2a2a796c80db3798350e78c5c0b18c3d61a192263c13d6778ce5e1ba156b47f934a3dc7bf9f63354c929815ecb9c254f31208fa0d65889affb186b0947524c432fa779d17661359f4d72a67f6d19fea239639b78b14e5489a3a0d3ad7bec12af6b655ffade4fd20724d7a009f6b3430b6da031110a070cc3a18c69fa1465216d40948fdb09b2e16a4b7de9a0f8188de2e099df5314f72c473a4190c56e16265cfe2ae355f3d7e786f7811bb9d4e85045ea9cb70c6bb6a245f05acb97cdd0317e4a366f9a07d3b66e78277cf318edd77f6244ea1c5d307830e216fea1778cad76ff839afd84a3eac83ae8ad7214c0a46c238fb94237bd1798fcba44084dccd079d115e0ef210626df8ed6698e9c85c6054dc576d9c813398d110680bd523077bb371589d35d4ddc070c01adca8bc0695ec9d57d8ee0114178c08c120802483ad64257abd270bbff6df989597d8d3444c5ae5f2ee0dced692b7ddce800e50f422f487b5e436a483f6d3c73703161cae3eec69237921694362eacb4d86ad4bf7259f9ef5bd1615a18506dc0fffe302a23b97523407be5d851b668f71f43ccc607cca3b461b801835851ffc35a5b7533ccafa5eca7bd1c2130bc31e7882f1bbd3ec8beebf7d2ed9884609cfd0ae04a091968a4960c2929cd37b5498cac42b11163854e5fedb4a5ac98fff91995aa0ab2315fc81ff34423220d7436d56573813c961efdc01dd3157c0b240a2f9cbe8b96cf7349d97f35a0819b2228451658e0e06e7f3e01ba003b73da77f4d1f8673989b7dccc44b9d5f9001b88bfda9a2ad4bcae417cf356a1442d57a3fb6cc5f086a4437a921dda199db3544623b3e53df0254f6ee017cbbfbc14859e39e692b8b2713ca3d0ea918a6740cfbc531e3d959cb9b42892a31e218859e90f482e039406f9fea37a79902239fb0a1368d8ca37508c6d5360ff04c6dd1b679f290f768c6dcb7841303f2d1306560d0c02c370d63787d3280505d785fcee386583d1f17ed26ec89c68f00cf1d9fa6c25fcf6f71f556b766a0d246115ec1b278323333d946b4ef4542f1da302bbd1e3d33189ef03b0210f3f8aab65f71c1ab8f505429f3a5be18270bba4dc7989b7c1fb8ed5c75a9ebd0509a9b963771956e0134995383f46c85fd0c4181e1730b3b4bc9ee3837ff3e700b76057324e79e3c846715d5caefb7928d1c126359e6e5bb6546e4f6503cd671e149072fcfb2fc492d32c8d3271b3c63a8d3466f183c2f59196a4baa3e4e93a2c73c95abdeed84357cbbe00e8c96606188e0e1021fe32d9c2b99b6a2615ec31c040fb164c00ee2959039cb246477b95421ba29fdfe1a43646d57c11006b8bafeab0bc8e82976b35b3398f7304e2912b76a9ca3c97fe1a330cd51a6c4cc62e54c8c28bb4c16e5be24ac9f6ecf527398924fb9d5d9046ee3dc1908a4276fa6a730b980880d5a4861423e3968be554377cd0a51c226872185cc6eaec8d71baf79aaa416ca387ba121e285ef899b60163b825b99fb5e28d34410c39afe5e7f950ba5d9e20a1dcb3b3d9a3add6349d8e223536c8c753ab55607767ff1bd6d0ddeb81881691ef095b1a698fc073fafdf09a8cda67ee0fb8ad7cbae6bb1842e623522235688eee672d07ad7d9678ad21dd7ea116e8b87320b6fee3cc07a6582bbd760457857164b1762b9a7dce16515abcba3fbc625ed53fe9c4327f7cb771e0467ccaf432336e4f9bf639d480cc1ec9c2dcb843cb9b4e08f9e82ae21657bd18a19c5544095cd85e2058033254f32df043c02cf8433c1be6fb5955f5b3a2b12455b3a6dc85ea92147d6255dcfa9ff0cee4b5d2b43bd73593dc0a931026a717621cdc1aa4d5baf3a8556040b25abcee0c5419c0271331699551b47e442555efa91b6cda1222ddf0cbcea86bc43f6cdd8a4338450e7cbbd3a4888597bcd537b5384dbf3164b1643d4ab760197c6d41ab113cbf7e0243cb6e589302dc651e964b558cadaf8684215176c1f46cce205050822cfbb1f30980acf5a7e0bc5a0c8a0c1d15b47f58774feab1aa9ab72a3d64f2f72726aed628bba6f32fd1d1eedc0d8b551813d8444cd55bc06fae6715ac09f9f3a41cb748389924f2128197d0893b6003b30d093c0d16593cd13d4ff6a01730867ea7a4d342198ed690fa2abccdbf2933ec75907df369882cc514b2599265e908afeaf5c28f15ca73c8b3b93b490ba05c4a84a09360ba69dcff01cddc9fa9bbf9f33842c47f1252f1c2986d25ccb6f9b43aa8e292a2c802c7e1340f483b124b16e29491c5af707e47a9fc6a0c4e71e3d7f4b633ed170d81883a9cb97b53611", @generic="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", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="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"]}]}, 0x1b84}}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x0, 0x14, 0x1e, 0x16b, &(0x7f0000000040)}) 14:57:30 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003000000000652", 0x10) 14:57:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/meminfo\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x30) 14:57:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000005480), &(0x7f00000054c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaacab, &(0x7f0000006880), 0x0, &(0x7f0000000040)={[{@cruft}, {@gid}, {@cruft}, {@block}, {@sbsector}], [{@uid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'wg1\x00'}}]}) [ 2449.301976][ T9207] loop4: detected capacity change from 0 to 224 14:57:31 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/breakpoint', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000980), r0) [ 2449.380548][ T9213] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:31 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003000000000652", 0x10) 14:57:31 executing program 0: perf_event_open(&(0x7f0000001580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2449.480307][ T9213] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffff00000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2449.964235][ T9236] loop4: detected capacity change from 0 to 224 [ 2450.751025][ T9241] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2450.764287][ T9241] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:32 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 14:57:32 executing program 2: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 14:57:32 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003000000000652", 0x10) 14:57:32 executing program 0: pipe2$9p(&(0x7f0000000040), 0x0) 14:57:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffff50000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:32 executing program 5: syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='environ\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000006800), r0) bind$netlink(r0, &(0x7f0000006880)={0x10, 0x0, 0x0, 0x400}, 0xc) 14:57:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) [ 2451.319154][ T9273] loop4: detected capacity change from 0 to 224 14:57:33 executing program 0: clock_gettime(0x8e8a1ad8f7749764, 0x0) 14:57:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x30}]}, 0x24}}, 0x0) 14:57:33 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf00040030000000006521956860000000000", 0x18) [ 2451.426327][ T9276] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2451.504102][ T9276] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffff60000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x9, &(0x7f0000000640)=[{&(0x7f0000000780)="1372aab6fb868b21f685e4370ab681cbbb30f57a779fac2ca5947e8f3492bc49ba05cd2fbaa99bf1695a820f8cf7bc050579046542c1a4a7d2986f25627b0832e93340e6b669e386dd487901b210a99dcdd09029c4894364104596dab8f1c16475113c935c5974262bd72b6a121b4a0818f040955cb705e7a74644a3833d3c37cfa5a142e6fab105658a77f7a999f290e84370ae7685fd0c0b5b108001a8e9dbc9ec08b96e801009e627ebe94450ca79fada0ea87ef187f404ee6cc45a1afa3fde4ea47d72bc60eeb1de721d80631f2ad3d2cba5c0ed", 0xffffffffffffffe9, 0x3}, {&(0x7f0000000180)="5b0548191dd658c9a3f2d4ae31a8a28097fb0bf366a127a4af2a7733efa5b2f2cccb3afb70450066ee654b7955b0254b917c074cb715ae4c3ada2d8af71599163bca78f4bd9a18204126c302ade044c885335e9fac2d518447716d1364d0cff2ecd799ff0f3012e87d66bb3f00b08f764705ffe67aea89d3966874e77b78b99cf7e5e82e308aa3bb5fe98fa2a0d5528520e12137c79b12fc3b19075eae21ff143f65f41112d9d5d0d4eac8554e4944e63b04655e2caf212acafaa134ad742f3772cb90c4fcc20908950ebc0e0eb6cf6bb2bfc5df35c1fb041024647f43dacdc9f31ab9794762f2a6b0", 0xe9, 0x4}, {&(0x7f0000000280)="5d71c4be1484df702f4e7b2c76f6b6eb6c3851fdd5eb3b9c77b7c89e3db8049e0c958dc8b48d04cbeca170e8cfaa391f0b3cdbdb62aec3c48a62aa6d9b45f9f991fba3a719a8ff912963ca3fe7ba6d167b7ceaa2bb9621be4791edee5ab8b00e192009e44c31ac17c8398f491a25ebdd1f8fa87cc307dc2895ce18545751a2030fcd9e463f18d24feaffc67b4877df6188647dd4e45e8305e403d32fcf9454ee2d6be0e1c054ab3080160ea609dbd3da5fcc9ba812268ceab647660c1092f09914e57967bbc8d45c5cf6e14e398554fa6707bf9553a626c1d6f69f36b33ca9c1f3bc8596922c7db3a4877716911d43c628b7c43fe3da69ce9d7f4ac7fb", 0xfd, 0x1000}, {&(0x7f0000000380)="e8d0ef2a6d6a782f3f0bcdee9b894758e8f0b5c529331e385a2cfda9ccae564a126674a222dbb988c11c", 0x2a, 0x32}, {&(0x7f00000003c0)="3045f3260be109c47fc1d614b4284e0159", 0x11, 0x81}, {&(0x7f0000000400)="2d17b40aed39e4cce8d196370b83365822cba007bc480bb4f49e", 0x1a, 0x80}, {&(0x7f0000000440)="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", 0xfb, 0x2}, {&(0x7f0000000540)="84e7496df83dafa1a22aeeb4be70e7f27a85b76b2bddb1bfb406e6bde2ae36eefc7b9d4ef303d56a72f1e1b68bd1a8247f7661d699853eedc8336ccb0c51f14eccffe884f578c5b1c189abcf28f03d26e68c34e1712bc3e9b53b304eb38b40a27478b21c7fe294aa0ff423a16a1e9c5289937f58de2a84007d3bd29803e25ebffe7aaeaf045b060b87bdaa0acc6767f3abda33f3bfbd023043f202b267e08dec4fb0ee8bd9947630965901dc1d1457b39c05b84108b67c82cfc8a06e5f2a59", 0xbf, 0x6}, {&(0x7f0000000600)="638a7c2401f5ee13f730ec46424ed5", 0xf, 0x3f7e9a88}], 0x1000004, &(0x7f00000006c0)=ANY=[@ANYRESOCT]) [ 2451.806651][ T9298] loop4: detected capacity change from 0 to 224 [ 2452.252204][ T9293] loop5: detected capacity change from 0 to 264192 [ 2452.294019][ T9293] FAT-fs (loop5): invalid media value (0xf2) [ 2452.315864][ T9293] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2452.730161][ T9305] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2452.748511][ T9305] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:34 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 14:57:34 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x107, 0x9, 0x0, 0x7) 14:57:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x17, &(0x7f0000000100)="f55bf1a2", 0x4) 14:57:34 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf00040030000000006521956860000000000", 0x18) 14:57:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffdf90000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:34 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b68, 0x0) 14:57:35 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b36, 0x0) 14:57:35 executing program 5: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000040)) [ 2453.378330][ T9340] loop4: detected capacity change from 0 to 224 14:57:35 executing program 0: r0 = fork() process_vm_readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/68, 0x44}], 0x1, &(0x7f0000000380)=[{&(0x7f0000000700)=""/102400, 0x19000}], 0x1, 0x0) 14:57:35 executing program 5: socket$inet6(0xa, 0x8080c, 0x0) 14:57:35 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf00040030000000006521956860000000000", 0x18) 14:57:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast1}}) [ 2453.538770][ T9347] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2453.602346][ T9347] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2454.583326][ T9378] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2454.602997][ T9378] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:36 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 14:57:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001780)={&(0x7f0000000040)={0xa, 0x4e20, 0x0, @local, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="740200002900000002"], 0x274}, 0x0) 14:57:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffffb0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:57:36 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7f", 0x1c) 14:57:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8003e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000c, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000a40)=ANY=[], 0x44) 14:57:36 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x0) 14:57:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) [ 2455.256600][ T9410] loop4: detected capacity change from 0 to 224 14:57:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f00000005c0)) 14:57:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7f", 0x1c) 14:57:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) 14:57:37 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x2bb98205) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x4ff99, 0x0) [ 2455.373999][ T9416] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2455.472585][ T9416] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2456.612167][ T9442] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2456.630295][ T9442] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:38 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x2) 14:57:38 executing program 0: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000), 0xfffffffffffffd24) 14:57:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffffe0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:38 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7f", 0x1c) 14:57:38 executing program 2: socketpair(0x10, 0x2, 0x7fffffff, &(0x7f0000000000)) 14:57:38 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x2bb98205) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ff99, 0x0) 14:57:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) [ 2457.215725][ T9472] loop4: detected capacity change from 0 to 224 14:57:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:57:39 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeff", 0x1e) [ 2457.302550][ T9474] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2457.382382][ T9474] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000ff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:39 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) 14:57:39 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)) [ 2457.808571][ T9495] loop4: detected capacity change from 0 to 224 [ 2458.571725][ T9506] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2458.591510][ T9506] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:40 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x3) 14:57:40 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeff", 0x1e) 14:57:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) sendmsg$inet6(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="10"], 0x10}, 0x0) 14:57:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:57:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000fff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:57:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000100)={'vlan1\x00', @ifru_flags}) [ 2459.184539][ T9539] loop4: detected capacity change from 0 to 224 14:57:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=[@dstopts={{0x14}}, @tclass={{0x10}}, @dontfrag={{0x10}}], 0x34}, 0x0) 14:57:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f0000000280)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001380)=[@pktinfo={{0x20, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}], 0x20}, 0x0) 14:57:41 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x1000000, &(0x7f0000000040)) 14:57:41 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeff", 0x1e) 14:57:41 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4) 14:57:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffff7ff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) sendmsg$inet6(r0, &(0x7f0000000200)={&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="10"], 0x10}, 0x54) 14:57:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000440)) 14:57:41 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x10000) 14:57:41 executing program 0: r0 = socket(0x2c, 0x3, 0x0) accept4(r0, 0x0, 0x0, 0x0) 14:57:41 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffff", 0x1f) 14:57:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000006c0)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) [ 2459.686447][ T9567] loop4: detected capacity change from 0 to 224 [ 2459.702141][ T9565] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2459.760085][ T9565] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:41 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000340)={'syz0', "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"}, 0x1000) r2 = socket$inet6(0xa, 0x3, 0x2c) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x2bb98205) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x4ff99, 0x0) 14:57:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffffbff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:41 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffff", 0x1f) 14:57:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002fc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) [ 2460.257945][ T9599] loop4: detected capacity change from 0 to 224 [ 2461.089321][ T9608] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2461.111037][ T9608] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:43 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x5) 14:57:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:57:43 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffff", 0x1f) 14:57:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000001fffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:43 executing program 5: r0 = openat$vnet(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 14:57:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 14:57:43 executing program 5: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x800001, &(0x7f0000000280)) [ 2461.764780][ T9643] FAT-fs (loop5): bogus number of reserved sectors [ 2461.782221][ T9643] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2461.817779][ T9650] loop4: detected capacity change from 0 to 224 [ 2461.846401][ T9643] FAT-fs (loop5): bogus number of reserved sectors 14:57:43 executing program 2: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, &(0x7f0000001640)=[{&(0x7f0000000380)=""/204, 0xcc}, {0x0}], 0x2, 0x0) 14:57:43 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x107, 0x13, 0x0, 0x0) 14:57:43 executing program 5: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000003180)=[{&(0x7f0000000140)="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", 0xec1}], 0x0, 0x0) [ 2461.867544][ T9643] FAT-fs (loop5): Can't find a valid FAT filesystem 14:57:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:43 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6) [ 2462.032623][ T9663] loop5: detected capacity change from 0 to 7 14:57:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f0ffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2462.153934][ T9663] loop5: detected capacity change from 0 to 7 14:57:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x545d, 0x0) 14:57:44 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0xf0ff7f) 14:57:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x10}, @void}}}, 0x1c}}, 0x0) [ 2462.333713][ T9676] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541d, &(0x7f0000000000)={0x2, {0x2, 0xfff9}}) [ 2462.384243][ T9683] loop4: detected capacity change from 0 to 224 [ 2462.413580][ T9676] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b48, &(0x7f0000000000)) 14:57:44 executing program 2: r0 = socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 14:57:44 executing program 0: mremap(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) mlock2(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ff2000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000fec000/0x3000)=nil) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = fork() move_pages(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000080), 0x0) 14:57:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fff7ffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:44 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000140)=""/174, 0xfdef) [ 2462.991261][ T9712] loop4: detected capacity change from 0 to 224 [ 2463.795193][ T9717] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2463.803385][ T9717] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:46 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x7) 14:57:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, r1, 0xa01, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 14:57:46 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x560e, 0x0) 14:57:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) 14:57:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fffbffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:46 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4d, 0x0, 0x0) 14:57:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000140)=""/174, 0xae) [ 2464.531948][ T9754] loop4: detected capacity change from 0 to 224 14:57:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5441, 0x0) 14:57:46 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmat(r0, &(0x7f0000ff1000/0x3000)=nil, 0x5000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff0000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x6000)=nil, 0x6000) 14:57:46 executing program 0: prctl$PR_SET_MM(0x17, 0x0, &(0x7f0000ffb000/0x1000)=nil) 14:57:46 executing program 2: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffd000/0x2000)=nil) 14:57:46 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x8) 14:57:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000f9fdffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:46 executing program 0: mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ff6000/0x1000)=nil) 14:57:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000003700)={0x11, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}}}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x0) 14:57:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x74, 0x0, 0x0, 0xa8}]}) 14:57:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1263, &(0x7f0000000080)) [ 2465.040632][ T9784] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2465.110240][ T9784] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2465.124475][ T9791] loop4: detected capacity change from 0 to 224 14:57:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5437, 0x0) 14:57:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f0000000000)={0x2, {0x2, 0xfff9}}) 14:57:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000007fffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x5, 0x0, 0x0, {{0x23}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 2465.762801][ T9826] loop4: detected capacity change from 0 to 224 [ 2466.371500][ T9828] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2466.393862][ T9828] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2466.745882][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 2466.752283][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 14:57:48 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x9) 14:57:48 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1e, 0x0, 0x0) 14:57:48 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x25}]}) 14:57:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b4a, 0x0) 14:57:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000008cffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:48 executing program 5: sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="800000000002010400000000000000000200000024000280140001c008000100ac1414aa08000200ac1e00010c0002800500010000000000240003801400018008000100ac1414bb08000200ac1414bb0c0002800500010000000000240001800c000280050001ef00000000140001800800010000000000080002"], 0x80}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000003) [ 2467.096670][ T9869] loop4: detected capacity change from 0 to 224 14:57:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:48 executing program 0: mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) mlock2(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x0) r0 = fork() move_pages(r0, 0x1, &(0x7f0000000200)=[&(0x7f0000ff9000/0x2000)=nil], 0x0, &(0x7f0000000280), 0x0) 14:57:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5414, &(0x7f0000000000)) 14:57:49 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xe) 14:57:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000f0ffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:49 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x8}, 0x0, 0x0, 0x0) [ 2467.610097][ T9894] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:49 executing program 2: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000000)={'sit0\x00', 0x0}) [ 2467.642547][ T37] audit: type=1804 audit(1628348269.383:222): pid=9866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir710517357/syzkaller.ZB6uqi/3921/cgroup.controllers" dev="sda1" ino=15727 res=1 errno=0 [ 2467.726494][ T9900] loop4: detected capacity change from 0 to 224 [ 2467.752066][ T9894] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2467.858380][ T37] audit: type=1800 audit(1628348269.383:223): pid=9866 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=15727 res=0 errno=0 14:57:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 14:57:49 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b71, 0x0) 14:57:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5608, 0x0) 14:57:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000f5ffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b32, &(0x7f0000000000)) [ 2468.176925][ T37] audit: type=1800 audit(1628348269.433:224): pid=9862 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=15727 res=0 errno=0 14:57:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1800}, {&(0x7f0000011000)="8081000000180000def4655fdef4655fdef4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000050", 0x3d, 0x1c00}], 0x0, &(0x7f0000013800)) 14:57:50 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0xb, 0x0, 0x4) [ 2468.402369][ T9959] loop4: detected capacity change from 0 to 224 [ 2468.424582][ T9964] loop5: detected capacity change from 0 to 1024 14:57:50 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5425, 0x0) [ 2468.513865][ T9964] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2468.600055][ T9964] EXT4-fs error (device loop5): ext4_quota_enable:6438: comm syz-executor.5: Bad quota inode # 3 [ 2468.641379][ T9964] EXT4-fs warning (device loop5): ext4_enable_quotas:6475: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 2468.689860][ T9964] EXT4-fs (loop5): mount failed [ 2468.776884][ T9964] loop5: detected capacity change from 0 to 1024 [ 2468.800049][ T9964] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 2468.840180][ T9964] EXT4-fs error (device loop5): ext4_quota_enable:6438: comm syz-executor.5: Bad quota inode # 3 [ 2468.867069][ T9964] EXT4-fs warning (device loop5): ext4_enable_quotas:6475: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 2468.901665][ T9964] EXT4-fs (loop5): mount failed [ 2469.402279][ T9961] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2469.420652][ T9961] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:51 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x48) 14:57:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5417, 0x0) 14:57:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000f6ffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3}, {}]}) 14:57:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8936, 0x0) 14:57:51 executing program 0: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) 14:57:51 executing program 5: prctl$PR_SET_MM(0x27, 0x0, &(0x7f0000ffb000/0x1000)=nil) [ 2470.227181][T10035] loop4: detected capacity change from 0 to 224 14:57:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @private1}}) 14:57:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b52, &(0x7f0000000000)={0x2, {0x2, 0xfff9}}) 14:57:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b3c, 0x0) 14:57:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) [ 2470.382603][T10041] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="5a1400001a0025f00485bc04fef7681d020b49ff70880000803d2800080201007f141410bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 2470.466838][T10041] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2470.529875][T10056] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2470.546569][T10056] netlink: 4662 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2471.470835][T10075] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2471.488239][T10075] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:53 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4c) 14:57:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000fbffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0xfff9, 0x0, 0x300}}) 14:57:53 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x3e, 0x0, 0x0) 14:57:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x540b, &(0x7f0000000000)) 14:57:53 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:57:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0xfff9, 0x0, 0x300}}) 14:57:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) [ 2472.073508][T10105] loop4: detected capacity change from 0 to 224 14:57:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8970, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:57:53 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b49, 0x0) 14:57:53 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x4a, 0x0, 0x4) 14:57:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) [ 2472.242932][T10110] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2472.314837][T10110] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.312450][T10140] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2473.329510][T10140] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:55 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x60) 14:57:55 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x540f, 0x0) 14:57:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000feffffff0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x2) fallocate(r0, 0x8, 0x0, 0x5) 14:57:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x64, 0x0, 0x0, 0xa8}]}) 14:57:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:57:55 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 14:57:55 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x31, &(0x7f0000000000), 0x4) [ 2473.914743][T10170] loop4: detected capacity change from 0 to 224 14:57:55 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x28, &(0x7f0000000000), 0x4) 14:57:55 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 14:57:55 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) [ 2474.051237][T10174] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) unshare(0x22000400) ioctl$LOOP_CLR_FD(r0, 0x4c08) [ 2474.132813][T10174] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2475.163066][T10207] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2475.179629][T10207] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:57 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x68) 14:57:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff8000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0xffffff2a) 14:57:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000200000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x32, 0x0, 0x0) 14:57:57 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) 14:57:57 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xffffffd5, &(0x7f0000000280)={0x0}}, 0x0) 14:57:57 executing program 5: r0 = fork() fork() ptrace(0x10, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 2475.776805][T10234] loop4: detected capacity change from 0 to 224 14:57:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x60, 0x0, 0x0, 0xa8}]}) 14:57:57 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5609, &(0x7f0000000000)={0x2, {0x2, 0xfff9}}) 14:57:57 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) [ 2475.906518][T10245] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:57 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) 14:57:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5605, 0x0) [ 2476.016368][T10245] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2476.936349][T10270] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2476.949998][T10270] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:57:59 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6c) 14:57:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:57:59 executing program 5: r0 = socket(0x2, 0xa, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 14:57:59 executing program 0: add_key$user(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="83", 0xfffff, 0xfffffffffffffffb) 14:57:59 executing program 2: r0 = syz_open_dev$loop(0x0, 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:57:59 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5606, 0x0) 14:57:59 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) 14:57:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0xffffffff, 0x2) pwritev(r0, &(0x7f00000015c0)=[{&(0x7f0000000040)='=', 0x1}], 0x1, 0x0, 0x0) [ 2477.573049][T10301] loop4: detected capacity change from 0 to 224 14:57:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x35}]}) 14:57:59 executing program 2: r0 = syz_open_dev$loop(0x0, 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) [ 2477.676149][T10307] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:57:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 14:57:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @private1}}) [ 2477.772124][T10307] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2477.936991][T10325] sit0: mtu greater than device maximum [ 2478.802486][T10332] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2478.822583][T10332] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:01 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x74) 14:58:01 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5413, &(0x7f0000000000)) 14:58:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000400000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:01 executing program 2: r0 = syz_open_dev$loop(0x0, 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:58:01 executing program 0: sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) mbind(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000100), 0x70, 0x0) 14:58:01 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 14:58:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0xffffffff, 0x0) pread64(r0, &(0x7f0000000040)=""/121, 0x79, 0x0) [ 2479.464175][T10362] loop4: detected capacity change from 0 to 224 14:58:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:58:01 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) 14:58:01 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) writev(r0, 0x0, 0x0) 14:58:01 executing program 3: r0 = fsopen(&(0x7f0000000180)='binfmt_misc\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 2479.587075][T10365] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2479.672193][T10365] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000500000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2480.043205][T10390] loop4: detected capacity change from 0 to 224 [ 2480.706284][T10398] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2480.718106][T10398] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:02 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x7a) 14:58:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x40081271, &(0x7f0000000080)) 14:58:02 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0xea61b13059d5b98f, 0x0) 14:58:02 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) 14:58:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:58:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000600000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:03 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2f, &(0x7f0000000000), 0x4) [ 2481.241308][T10428] loop4: detected capacity change from 0 to 224 14:58:03 executing program 5: sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) mbind(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000100), 0x1000, 0x0) 14:58:03 executing program 3: mbind(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x4, 0x0, 0x0, 0x0) 14:58:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 14:58:03 executing program 0: r0 = fsopen(&(0x7f0000000180)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='proc@\x9b\x1fs\xb4i{m\x91\xcb\x1b4\xa1\xe9\xe5o}J\x05\x1b\x1e\x96:\xb6\x18W\xca\x1a\xac\xd3(\xca\xba\x86\xf9\xfb\xa4v\x8f\x8fw\b:>\x04\xfb\xf7\x92\xde0$\x05\xe0\xb8\xdeE\xba\xdb\xdc4\xa0M+\xe4:.d\x94y\xec\x1b\x8b{@\x17\xec\xefEW\xfa\xf4\x8f\xc4\xfe\x8f\xbdA*=\xc1\xdb\x81\xc5\xe1\xa3_\xfe\x87XgE\x04\xc7\xedq\xeb\xc6\xf97\xa2\xb7D\x11\xfcI\xebM\xe1\xf3?\x81\x97\xf4\xdc\xe9M2\xa8\x91u\xa7G\x95\xc5\xfb\xb1uK\fgA\x19W\x81\xdc\xca6\xe0\xd4V\xf7\r\x92u', &(0x7f0000000340)='\x02\x85\ng\xe6\x96\x8f\xd8<~`\xe2\xc8[\x82!\xe2\x03f\x05\x91\xf0\xff\xe2e\x82\xc9\x82q\xe9\x95\xfc\x86\x18\xdd\xd7$\xb2\xc9\x16\x95\x04\x04\xd3\x81A\xc3f\xec\x88=8Hw\xa3\x7f\x81\xf0\xc5\xf9\xdc\xd2\xdb\x9d\x82>\x8e\xff\x8b\x12\x83\x10y\xa9\xd1am\x96\x89Z\xdd\xf9\xfe?}\xea\xf2n&\xd2\xd8]\x04\xca\x88x\xd59K\xd7*\xc3..\x97\'\x1f\xbd\x82\xd7\xe7\xc9#\x1d\x8e\x7fE\x84M\xdb\x8e}\xabsO)\x06\xca WRY(M\xb7\xd3Z\xc4\xe7\xe6\x1e\x92\xff\xd4\x8f;9\xae\x8e\xe9~\\\xe6\x1e\x81\xc1*\\\x05.\x10\xec8\xd1\xc7\x8c\xb8\x03\xc7\xc0\x82\x9b\x9d\xf0dpL%t\xe8\xc5J\x15OH\x02\xea\xbd\xeb\x05\x8c#\xd7\xd9[p-Q\xadX2\xe7t\xe92\x17\xc6\xad\xbc\xf7\x95\xfcO\xdf\bnu\xa9b*\xb9F\x81\x0f\xe8\xa2\xa5\x81\x91\xf3\xe7\x0f6\xae\x88\xcb\xf8g\xa4\xc5\x1b\xf8C\x9a\"\x93H\xf6\xefV\xed\xe5s\xf2\x11\x8c\r\xf6e\xae\xe90\\\x8c\x7feV{\x9a\xb41r\x01\xf7\xe7\x83Q\xa4r\xe4\x04I\xc0\rF\xc8%\x88\xe9I;\xf5\x96\xf9\x14\x11\xb5\x02\x17\xcd\x15\x1f4*\x82b\rAwu0\xcf\xf3\xc8\xa9\xfe\x7f\xad\fg\xec\xe1\x9a\x89\xdc\xfcv]@\xee\xa6\x11\xa7q\xe4@\x01W6I\xc3\xae^\xf63r\x19\xfcdy]\xfd\xc6\xb0r\x03\xe0\x95{\xf0U\x1e.S3\xd7\xc8\xc9\xc0\'*f\xf3\x1c\xa3T\xf2f\xb4\xf5\x963\x13ny8\x9bP\x9a\x00\x90\x9f\xabp\xdb\x98tX\xfb\xa6\xeb:\x9fX', 0x0) 14:58:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b68, 0x0) [ 2481.401235][T10430] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2481.466720][T10430] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2482.434775][T10458] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2482.446972][T10458] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:04 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xf0) 14:58:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000700000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 14:58:04 executing program 2: syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) 14:58:04 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x7000) shmat(0x0, &(0x7f0000ff1000/0x3000)=nil, 0x5000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff0000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff4000/0x1000)=nil, 0x1da8c000) 14:58:04 executing program 0: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) 14:58:04 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_async', 0x4000, 0x0) [ 2482.989820][T10487] loop4: detected capacity change from 0 to 224 14:58:04 executing program 2: syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) [ 2483.051584][T10488] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:58:04 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000002780)={0x0, 0x0, 0x0}, 0x40002127) 14:58:04 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x1a, 0x0, 0x4) 14:58:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRK(r0, 0x5425, 0x0) [ 2483.124350][T10488] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2483.554310][T10513] loop4: detected capacity change from 0 to 224 [ 2484.261387][T10520] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2484.280502][T10520] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:06 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x300) 14:58:06 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$snapshot(r0, &(0x7f0000000080)=""/132, 0x84) 14:58:06 executing program 2: syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c06, 0x0) 14:58:06 executing program 0: socketpair(0x2, 0x0, 0x8177b3f, 0x0) 14:58:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f0000000080)=0x80) 14:58:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000900000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) connect(r0, 0x0, 0x0) 14:58:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2484.882850][T10553] loop4: detected capacity change from 0 to 224 14:58:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') 14:58:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0)=0x81, 0x4) [ 2484.975466][T10558] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:58:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) [ 2485.076512][T10558] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000a00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2485.513243][T10589] loop4: detected capacity change from 0 to 224 [ 2486.200525][T10597] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2486.213531][T10597] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:08 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x500) 14:58:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) syz_fuse_handle_req(r0, &(0x7f00000029c0)="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", 0x2000, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x3b, 0x6, 0x0, {0x3, 0x1, 0x12, 0x0, './cgroup.cpu/syz1\x00'}}, 0x3b) 14:58:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000), 0x4) 14:58:08 executing program 2: pipe(&(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000400)=[{&(0x7f00000002c0)="e6", 0x1}, {&(0x7f0000000100)="f9", 0x1}, {&(0x7f0000000180)="776d9d388685e51b4fd049bd41f4a9d2718bb1194c9571ac13be7a8ec706716cff46510d72da87019cc45e023273f29a0733ecb521acce2db5de1f196d24fb142c36e1858d9e2e5be0c96d63ce5320426e6727db51bec85eab8117933ce5dea0d34c7200767ede0fbf7e4a2891d30980a487e87ffde528185fbfab8ed38e15c224a0f96b9e3c309181c317ddb729845f095a50540bc54cb008fc2da2e990602c09dee2954944abbee35a80b9b72e7263b517eb99488302eb7247a902cd40f904f2e596bafb7458a99c6ed3e070af0e4b0c3e00513dd69c895d93de1e3a4a78", 0xdf}, {&(0x7f00000005c0)="11ac32", 0x3}], 0x4, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x80000000, 0x0) 14:58:08 executing program 3: move_pages(0x0, 0x2, &(0x7f0000000040)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000080), &(0x7f00000000c0), 0x0) 14:58:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), 0x4) 14:58:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') read(r0, 0x0, 0x0) [ 2486.861469][T10629] loop4: detected capacity change from 0 to 224 14:58:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) 14:58:08 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002280)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 14:58:08 executing program 0: r0 = getpgid(0x0) r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000000)) 14:58:08 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') [ 2486.995702][T10638] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2487.091217][T10638] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2488.073990][T10667] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2488.090896][T10667] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:10 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x600) 14:58:10 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7f) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 14:58:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000d00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES64=r0], 0x18}, 0x0) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x1c}, 0x0) 14:58:10 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000180)=@hat={'changehat ', 0xfffffffffffffffc, 0x5e, ['/pro\xe3/thread-self/attr/current\x00\x89\xc7gzl\xe1e\x9a\xe3\xec+\x11)\a\x00b\xcd8\xa4\xeb\xa8#,\t\x00B\xf4\x8aB']}, 0x88) 14:58:10 executing program 2: pipe2(&(0x7f0000000040), 0x0) syz_open_procfs(0x0, &(0x7f0000002100)='fd/4\x00') 14:58:10 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x418682, 0x0) 14:58:10 executing program 5: ioprio_set$uid(0x0, 0xffffffffffffffff, 0x2004) 14:58:10 executing program 5: mount$fuseblk(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x0, 0x0) [ 2488.731880][ T37] audit: type=1400 audit(1628348290.473:225): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10689 comm="syz-executor.0" [ 2488.756134][T10697] loop4: detected capacity change from 0 to 224 14:58:10 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x8, 0x0, 0x0) 14:58:10 executing program 5: memfd_create(&(0x7f0000000040)=':\x00', 0x2) 14:58:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$tun(r0, 0x0, 0x0) [ 2488.934559][T10705] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2488.997190][T10705] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2489.971785][T10732] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2489.983793][T10732] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:12 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x700) 14:58:12 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}, {0x0, 0x0, 0x0, @empty}}}}}, 0x0) 14:58:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000f00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:12 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0x2b8, 0xffffffff, 0x230, 0x230, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'syzkaller1\x00', 'team_slave_0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast1, 'gre0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:58:12 executing program 2: r0 = fork() move_pages(r0, 0x2, &(0x7f0000000040)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f00000000c0), 0x0) 14:58:12 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r0) 14:58:12 executing program 5: mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) sigaltstack(&(0x7f0000ffa000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) 14:58:12 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000280)='./file0\x00'}, 0x10) [ 2490.635955][T10763] loop4: detected capacity change from 0 to 224 14:58:12 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 14:58:12 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000040)={@link_local, @broadcast, @val={@void}, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @link_local, "", @link_local}}}}, 0x0) 14:58:12 executing program 3: io_setup(0x1ff, &(0x7f0000002280)=0x0) io_setup(0xdc, &(0x7f00000001c0)) io_destroy(r0) [ 2490.771267][T10772] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:58:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x3c0, 0xffffffff, 0x188, 0x188, 0xb8, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'syzkaller1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@empty, 'gre0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@local, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'vlan0\x00'}, 0x0, 0x178, 0x1a0, 0x0, {}, [@common=@inet=@recent1={{0x108}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) [ 2490.852949][T10772] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2490.958606][T10784] x_tables: duplicate underflow at hook 2 [ 2491.921383][T10800] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2491.939016][T10800] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000001000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:14 executing program 2: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000000)=0x6, 0x7, 0x2) 14:58:14 executing program 5: io_setup(0x1ff, &(0x7f0000002280)=0x0) io_setup(0xf47e, &(0x7f0000000000)) io_destroy(r0) io_setup(0x9, &(0x7f0000000200)) 14:58:14 executing program 0: socketpair(0x2c, 0x0, 0x0, 0x0) 14:58:14 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x900) 14:58:14 executing program 3: socketpair(0x2, 0x3, 0x3f, 0x0) 14:58:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') read(r0, 0x0, 0x0) 14:58:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) [ 2492.552004][T10830] loop4: detected capacity change from 0 to 224 [ 2492.588638][T10831] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:58:14 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file0\x00', 0x120c2, 0x0) mount$fuseblk(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x201001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file0\x00', 0x0, 0x0) 14:58:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt(r0, 0x0, 0x4, 0x0, &(0x7f0000000040)) [ 2492.673069][T10831] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:14 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') syz_open_procfs$namespace(0x0, &(0x7f0000003940)='ns/pid_for_children\x00') 14:58:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000001100000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8}, 0x3) 14:58:14 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)) 14:58:14 executing program 5: r0 = fork() waitid(0x2, r0, 0x0, 0x100000a, 0x0) 14:58:14 executing program 0: shmget(0x0, 0x2000, 0x1970a7021a896b8d, &(0x7f0000ffe000/0x2000)=nil) [ 2493.197140][T10861] loop4: detected capacity change from 0 to 224 [ 2493.959329][T10872] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2493.971124][T10872] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:16 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xb12) 14:58:16 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 14:58:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='limits\x00') read(r0, 0x0, 0x0) 14:58:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:58:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000001800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 14:58:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000800)=@nat={'nat\x00', 0x1b, 0x5, 0x428, 0x2e8, 0x150, 0xffffffff, 0x0, 0x2e8, 0x390, 0x390, 0xffffffff, 0x390, 0x390, 0x5, 0x0, {[{{@uncond, 0x0, 0xe0, 0x150, 0x0, {}, [@common=@unspec=@ipvs={{0x48}, {@ipv6=@empty}}, @common=@ttl={{0x28}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "27a3d9c5a1b9db912372bafbda8bfc9e3f45c69ce4909d57ea1ede3fbb031fafc6a31db8a88b4a410645d64e2dc7da93697748e555b6db89adba59671183092d"}}}, {{@ip={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'team0\x00', 'ip6gretap0\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@dev, @remote, 0x0, 0x0, 'team_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr, @dev, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x488) [ 2494.527555][T10905] loop4: detected capacity change from 0 to 224 14:58:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') 14:58:16 executing program 3: memfd_create(&(0x7f00000001c0)='Qu\x98\xa6_{~0B\x85V\xc1\x95\xef\x8a+\xfd\x19\xe0\xa1\xc7\\F`*\xb95\x7f\x12nm\xc4\x17\x17\x9b\xf4\xd7\xca]\xcc\xba\xa1>\xee\xd4Y\xaaU\xda\xf9\xce\xc7/w\x98\xbel\xe5S{\xd8\x14\x84X\xa2vT^\x85\x87`em\xe2&\xf2\x14W\xdb\xc0!\xd8\xea\x16j\"\x86\x7f\xfd@\xc6,\xe4\x93\x12\x9b<\xcb\xb0\xe8+t\xd14\x9eD\xa7\xadf\xc9.&\xc5\x133\xd3e\xd6\xb4Z\x1d\x9c\xdf\xfb\xa7n\xfb\x1c(V\x82\xcbvp}\xe4\xdd\xa6\"@\xdc\v,\x1a\x1a\x052p\x9b\xf2j\x93\x8a\xff\xa4j\xe6\xeb\x99:\xbe~8h\xa7\xbe\xdb8\xe1\xbb\x8ch\x87\xf7\x94^O\xfb\xc9\xe4\x11\xd5\x92\xccy\xf5\xf1\xae\x06\v\xa5\xfc\x047\xe0\xbev0+\xc1\xee\xbc\xa5S9\x0fs\xe5\xc9\v\xa6\x11{\x8f\xf3\x9c9\xc0\r\xbdC\xbc\ak\xe8\x87j\xfe\xfe\x0eRB|n\xde\xdf\xd8`H\xc9%@\x8e\xc7\x88\xcb4\x16c\x92t\xc9\xb5\x8c\xb0m\xf7\xc4(\xb8O\xf6\x0f\xb1d@\x93\xf13\x1b\xd3!\x80\xaa}M\xf8\xd4\xb2\xc3\x02\xbc\x86wE\xa4\tO\xb8enG\xbe\xa6\xac\a\x02\x9ct&.\xf5A\xe9\xe5e_\xcf0\xfaE\xdd\xe7\xee\xc4\xea]9\x89*\xc1\xe7/\x16@\x8f\xc4w\xb9\xb1\x9eQ\xa0C\xee}\r%\x95\x9b\xe4\xce\xe12\xd6\xd35\xc9K\x0e\"nY \x89U\x93.\x94\xa5\xddxy\xe1\xdb\x1c\xf1[i\xc8\x83\x0f\x82T\xf1\xca\vAW\xa1\x88\xb0I\xcd\xc2\x82\x04\xaa\xa5S\x9f\x12\xc8\x1a\xc9>\x8b3\xe2\n\x04%p\xfd|O\xa3\x00\x00\x00\x00\x00L!px{\xc0', 0x0) 14:58:16 executing program 0: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7) 14:58:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, r1) [ 2494.661318][T10908] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2494.708112][T10908] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000002300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2495.118164][T10931] loop4: detected capacity change from 0 to 224 [ 2495.825604][T10939] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2495.841701][T10939] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:18 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xe00) 14:58:18 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 14:58:18 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x15780, 0x0) 14:58:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) 14:58:18 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000d80)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0xf8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1f8, 0xffffffff, 0xffffffff, 0x1f8, 0xffffffff, 0x3, &(0x7f0000000d40), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x2, 0x7, [0x3d, 0x1f, 0x14, 0x11, 0x16, 0x1e, 0x2f, 0x25, 0x15, 0x3c, 0x7, 0x1, 0x2d, 0x1c, 0x19, 0xa], 0x0, 0x4000, 0x1c}}}, {{@ip={@private=0xa010102, @multicast2, 0xffffffff, 0xffffff00, 'netpci0\x00', 'veth0_to_team\x00', {}, {}, 0x32, 0x0, 0x10}, 0x0, 0xe0, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x40, 0xfffffffe, 0x6, 0x1, 0x5, 0x4, 0x9e}}, @inet=@rpfilter={{0x28}, {0xc}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000040)='\x00o', 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth0_to_bridge\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000080)={0x0, 'syz_tun\x00', {}, 0x7f}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ip6gre0\x00'}) 14:58:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:18 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000001380)='./file0\x00', 0x120c2, 0x0) utimes(&(0x7f0000000000)='./file0\x00', 0x0) [ 2496.412752][T10969] x_tables: duplicate underflow at hook 3 [ 2496.426856][T10970] loop4: detected capacity change from 0 to 224 14:58:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) sendmmsg$sock(r0, &(0x7f0000006480)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @empty}, 0x80, 0x0}}], 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:58:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000100)={'team0\x00', @ifru_mtu}) 14:58:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'vlan1\x00'}) [ 2496.518896][T10981] x_tables: duplicate underflow at hook 3 [ 2496.526586][T10975] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2496.600597][T10975] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004500000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001f40)=@newchain={0xec4, 0x64, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_route={{0xa}, {0xa74, 0x2, [@TCA_ROUTE4_TO={0x8}, @TCA_ROUTE4_ACT={0x25c, 0x6, [@m_nat={0x104, 0x0, 0x0, 0x0, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{}, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @multicast1, @dev}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @initdev={0xac, 0x1e, 0x0, 0x0}, @private}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @rand_addr, @multicast1}}, @TCA_NAT_PARMS={0x28, 0x1, {{}, @multicast2, @local}}]}, {0x11, 0x6, "9ded81f2290ebfb6452f461dae"}, {0xc}, {0xc}}}, @m_mpls={0xf0, 0x0, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c}, @TCA_MPLS_TC={0x5}, @TCA_MPLS_PROTO={0x6}]}, {0x95, 0x6, "a433d7a76215380bd67779af9a923d43940db6c05c1fe7316baa5339cbb7a8670f431b09b199019c027eefd74ecf0e636282cec747e4bb45f8b1519554f21d932b3e4c22e8d09147c0eed498ccd657943fc6ba57ea71eaf0e9ab53988bc240b5db13e89c92d4372736b5b90fb60d226aea2fe47db77cd45a9b971391c4e2aa21b67d3f12128e0ae6817a29e1c9e12193d9"}, {0xc}, {0xc}}}, @m_ct={0x64, 0x0, 0x0, 0x0, {{0x7}, {0x4}, {0x39, 0x6, "91418aef535060a2f4f5e6126ebba3fb8963e65e36388d703144c317ef1dd1d26a36967e5b132524ea28c5c3cb8e6b4b4dadcb1fff"}, {0xc}, {0xc}}}]}, @TCA_ROUTE4_POLICE={0x80c, 0x5, [@TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_RATE={0x404}]}]}}, @filter_kind_options=@f_tcindex={{0xc}, {0x40c, 0x2, [@TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404}]}]}}]}, 0xec4}}, 0x0) [ 2497.102797][T11007] loop4: detected capacity change from 0 to 224 [ 2497.711346][T11014] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2497.732826][T11014] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:19 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x120b) 14:58:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') read(r0, 0x0, 0x0) 14:58:19 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, 0x0, 0x0) 14:58:19 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000008b80)='/sys/kernel/uevent_seqnum', 0x0, 0x0) read$FUSE(r0, &(0x7f0000008bc0)={0x2020}, 0x2020) 14:58:19 executing program 2: getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f00000028c0)) 14:58:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000400)={'ipvlan0\x00', @ifru_map}) [ 2498.280145][T11045] loop4: detected capacity change from 0 to 224 14:58:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000080), 0x4) 14:58:20 executing program 2: io_setup(0x6, &(0x7f0000000040)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000000)={0x0, 0x989680}) 14:58:20 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x1000100) 14:58:20 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/ata_piix', 0x0, 0x0) fanotify_mark(r0, 0xa, 0x40000000, 0xffffffffffffffff, 0x0) 14:58:20 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x1f00) 14:58:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000004c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:20 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0xb000)=nil, 0x0}, 0x68) 14:58:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f0000000080)={'sit0\x00', 0x0}) 14:58:20 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) write$P9_RREADDIR(r2, &(0x7f00000002c0)={0xb}, 0xb) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 14:58:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000001e40)=[{{&(0x7f0000000480)={0xa, 0x0, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, &(0x7f0000001800)=[{&(0x7f00000004c0)="54458ae5433fd83b3ebbff4f6c3963ff8825afae6602fa3a28c322c9cb", 0x1d}, {&(0x7f0000000500)="96f63afd2f6225043713906402ee05392b87beb9b44e479dd7e6e9e6c5898b9e2e1cf9be2d75715193b764cd89f55fc462f54005a4365e062c2c621febbd525202d6581db864bcb9f6f43dc0ba7af8a789478585561d3bf90c487476aaf722229b186b8db69d6774d3d9c182a61e250883e0ff8f5cbbc504839dae97425f78f46a3656794903dff776235fe081d369cee6361eaa0d31287b04eaa58e3c8733efceb665ef0dd6f1f0622162b45d6cbb69f7ed7b15f496361695", 0xb9}, {&(0x7f00000005c0)="b1b867b1ef2561a3657d46e5", 0xc}, {&(0x7f0000000600)="0c77f3aebc6e57af63855c8f760e658bc6ef0f20ed4d90e1e1fef1f3963ed6eec94e5682e1e4ad0e109e586e7c9be3a3d22cab6a8a", 0x35}, {&(0x7f0000000640)="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", 0x3ba}], 0x5, &(0x7f0000001880)=[@rthdr={{0x18}}, @dstopts={{0x20, 0x29, 0x37, {0x0, 0x0, '\x00', [@padn]}}}], 0x38}}], 0x1, 0x0) 14:58:20 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc04000}]}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000001c0)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000000c0)={r1}) [ 2498.738352][T11071] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2498.802855][T11076] loop4: detected capacity change from 0 to 224 [ 2498.813176][T11071] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2498.881582][T11082] sit0: mtu less than device minimum [ 2498.980880][ T37] audit: type=1326 audit(1628348300.723:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 14:58:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000006800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) [ 2499.182508][ T37] audit: type=1326 audit(1628348300.723:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=317 compat=0 ip=0x4665e9 code=0x7fc00000 14:58:21 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x900) 14:58:21 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x600) [ 2499.406046][ T37] audit: type=1326 audit(1628348300.723:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2499.444593][T11106] loop4: detected capacity change from 0 to 224 [ 2499.581518][ T37] audit: type=1326 audit(1628348300.723:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 14:58:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000006c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2499.744246][ T37] audit: type=1326 audit(1628348300.723:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2499.896458][ T37] audit: type=1326 audit(1628348300.723:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2499.925344][T11123] loop4: detected capacity change from 0 to 224 [ 2499.968737][ T37] audit: type=1326 audit(1628348300.723:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2500.082208][ T37] audit: type=1326 audit(1628348300.723:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2500.183227][ T37] audit: type=1326 audit(1628348300.723:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2500.248158][ T37] audit: type=1326 audit(1628348300.723:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11077 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7fc00000 [ 2500.617901][T11108] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2500.630875][T11108] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2501.046669][T11114] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2501.058506][T11114] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 14:58:22 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x3f00) 14:58:22 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xe) 14:58:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000007400000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:22 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffff", 0x1f) 14:58:22 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x2) [ 2501.232554][T11159] loop4: detected capacity change from 0 to 224 14:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000007a00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2501.531887][T11172] loop4: detected capacity change from 0 to 224 14:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2501.781812][T11179] loop4: detected capacity change from 0 to 224 14:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fe00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2501.987194][T11186] loop4: detected capacity change from 0 to 224 14:58:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000003000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2502.169959][T11194] loop4: detected capacity change from 0 to 224 [ 2502.375499][T11119] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2502.390769][T11119] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:58:24 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf00040030000000006521956860000000000", 0x18) 14:58:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000005000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:24 executing program 0: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7f", 0x1c) [ 2502.893927][T11162] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2502.919189][T11162] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2502.978347][T11219] loop4: detected capacity change from 0 to 224 [ 2503.704214][T11160] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2503.723467][T11160] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2504.180999][T11163] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2504.192805][T11163] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2504.614172][T11192] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2504.633379][T11192] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:26 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4000) 14:58:26 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:58:26 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003000000000652", 0x10) 14:58:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000006000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:26 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 14:58:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2505.117264][T11275] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2505.126104][T11275] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2505.211942][T11284] loop4: detected capacity change from 0 to 224 14:58:27 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:58:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:58:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000007000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:27 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:58:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2505.650495][T11299] loop4: detected capacity change from 0 to 224 14:58:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000009000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2506.823748][T11283] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2506.836411][T11283] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2507.267224][T11287] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2507.279207][T11287] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2507.697671][T11314] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2507.709613][T11314] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:29 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4800) 14:58:29 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0xb120000}, 0x0) 14:58:29 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:58:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:29 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:58:29 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2508.186025][T11365] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2508.201694][T11365] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2508.218250][T11370] loop4: detected capacity change from 0 to 224 14:58:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:58:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:58:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000d000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:30 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2508.697210][T11388] loop4: detected capacity change from 0 to 224 14:58:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2508.856101][T11397] loop4: detected capacity change from 0 to 224 [ 2509.663176][T11368] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2509.671828][T11368] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2510.151425][T11369] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2510.163356][T11369] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2510.644891][T11376] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2510.657047][T11376] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2511.108491][T11390] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2511.121927][T11390] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2511.525609][T11403] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2511.537571][T11403] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:33 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4c00) 14:58:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000002010000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:33 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 14:58:33 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 14:58:33 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x700}, 0x0) 14:58:33 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x48}, 0x0) [ 2512.026649][T11471] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2512.045188][T11471] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2512.081702][T11476] loop4: detected capacity change from 0 to 224 14:58:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000011000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000018000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000001f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000020000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000001020000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2512.456489][T11496] loop4: detected capacity change from 0 to 224 14:58:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000023000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2512.591858][T11502] loop4: detected capacity change from 0 to 224 [ 2513.542746][T11473] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2513.551562][T11473] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2514.033336][T11477] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2514.046702][T11477] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2514.560197][T11475] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2514.579114][T11475] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2515.103233][T11481] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2515.119531][T11481] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2515.649781][T11512] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2515.667767][T11512] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:37 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6000) 14:58:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000003f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:37 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x9}, 0x0) 14:58:37 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x8}, 0x0) 14:58:37 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7}, 0x0) 14:58:37 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x6}, 0x0) [ 2516.170542][T11578] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2516.181897][T11578] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2516.229349][T11583] loop4: detected capacity change from 0 to 224 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000040000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000043000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000045000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000048000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2516.676760][T11601] loop4: detected capacity change from 0 to 224 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000004c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2516.814727][T11608] loop4: detected capacity change from 0 to 224 14:58:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000068000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2517.011152][T11616] loop4: detected capacity change from 0 to 224 [ 2517.754940][T11585] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2517.763770][T11585] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2518.234643][T11587] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2518.246579][T11587] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2518.721390][T11586] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2518.733442][T11586] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2519.186052][T11590] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2519.197934][T11590] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2519.607928][T11622] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2519.625120][T11622] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:41 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6800) 14:58:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000006c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:41 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 14:58:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000feff0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:41 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000005c0)={{0x8, 0x5, 0x80, 0x3712}, 0x2, 0x40, 0x1c8, r0, 0x6, 0x1, 'syz1\x00', &(0x7f00000000c0)=['&{@\x00', 'syz0\x00', 'syz0\x00', 'P\x00', 'syz0\x00', 'syz0\x00'], 0x1a, '\x00', [0x1, 0xa6, 0xfff, 0x1]}) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r0, &(0x7f0000002400)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10003, 0x0) [ 2520.084351][T11692] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2520.099121][T11692] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2520.131307][T11696] loop2: detected capacity change from 0 to 224 [ 2520.141162][T11697] loop4: detected capacity change from 0 to 224 14:58:42 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, 0x0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x4000) socket$pppl2tp(0x18, 0x1, 0x1) r2 = getpid() process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/221, 0xdd) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:42 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() r4 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) read$proc_mixer(r4, &(0x7f0000000100)=""/177, 0xb1) fcntl$addseals(r4, 0x409, 0x0) process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000074000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000007a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000c0ed000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2520.579008][T11717] loop4: detected capacity change from 0 to 224 [ 2520.733999][T11723] loop4: detected capacity change from 0 to 224 14:58:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000f0000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2521.566689][T11694] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2521.576021][T11694] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2522.099544][T11701] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2522.114424][T11701] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2522.664630][T11708] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2522.678213][T11708] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2523.148177][T11711] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2523.160532][T11711] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2523.598622][T11731] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2523.615469][T11731] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:45 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6c00) 14:58:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffe000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 14:58:45 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f0176cd1bd", 0x33fe0}], 0x1}, 0x0) 14:58:45 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:45 executing program 2: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = dup(0xffffffffffffffff) fcntl$setstatus(r2, 0x4, 0x4000) r4 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = getpid() process_vm_readv(r6, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f00000014c0)=ANY=[]) r8 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) read$proc_mixer(r8, &(0x7f0000000100)=""/177, 0xb1) sendmmsg$unix(r3, &(0x7f0000005680)=[{{&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="5c7841ce96ef815bacb31b26d9ad5e3c1fa9007cd3f6e97190ecb7a2bd140b0300d9a15d7fa9b0a6734fc485d85ea972550227927f9140c85b21ae6cdf8e991203b61230ce394cce765423472bcc23b9a3736219437a4e1298ace86f5e5a12705cd875c9ca1eae1a9bda81175ba3c17fc10ced2c760a0e3d5fcc1a64396cfe8537916e5c4796e6fc36a9f5fb82fddd0b2185cf91c3d22ca338437de1493846fef2563d658d44dd930b366156fdefb698d20ca5c9ebfbba03d0459f8f61c0424d16a1fb903a878bb7631818c30ba2b1a03219e9314fc804ffcffbfe22553a744a9389027025a171a46f01cbc0b3b8ed92", 0xf0}, {&(0x7f0000001740)="47096fc77822decffafd7f08944993f01e98cc5a31e8bcf439189963a343fe1b40b3cc4f2117be383efce3b88d8f2b9c543fc9abf5db99ce0295d03cd5d950c7e1fb642681aa0e660b0a27b08e773eaba23b64bd051bf0859cc407592c544107b780af222dbf49a324e531ffb1155270e8ec73a41be7abec7894256b6a7ccd427db831abe3f7fd1d215c77e8004c376c54480ae8d5485f51b7e36d9ef39a4b1d289ac76969de08ca5de8e1a04edad6741f4f90b8030d6645620f5b3526f279e0182cd2cae8929f87fa24ffa5d7ff5d852c930a0b4693b9f246ea03f36199", 0xde}, {&(0x7f0000001840)="988e845ba37f3ecba51a90aa35cd2d265ec56bee883119ccbd905eceed873c4d3be88bf56fbe47d7d68e0367d8ec8525e5692821860bed6cdd01f599ed24b67a18a24d1f4d2ca89a5e257dc11a551f2cbb9a21807455590da653d5d806bed98732ee9c719a6e83e0b262542ee1fab6bce589d701b2fdb9b33678f2082b2d55374d112a70699369b1a531f7b6a5960f9da6010acfe1da707cd2436e1e5b15ce43dfd5e435079e4ea98d9f296b431e2bc12768d71f32bb82f68006ea3e0374c9ebe588d243f7f7cc30467c80a1aaac7cec62e795e0bd024ff6290c9a43c13defb89a9da250b0f5d6a3bc22cb92fe", 0xed}], 0x4, &(0x7f0000004300)=[@rights={{0x24, 0x1, 0x1, [r3, r7, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x18, 0x1, 0x1, [r5, r7]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r7, r1, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r7, r1, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r5, r7, r1, r3, 0xffffffffffffffff, r8, r2]}}], 0x150, 0x1004c800}}, {{&(0x7f0000004480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005600)=[{&(0x7f0000004500)="730b217268000a1840572b02225b7583e916c7bb4127c2f5ed594b6a6970e61df48d4859b42228445fbad1baface9f756687a395a7d983b8e5fd46965fc15b2bbf62fa49f0f7556b28c9811f5717103260c9d55c6379ca2ccc670bdbdd47ea4ba977216886187b88e852f8808b393d66ddf74200077dcdf124d88642a4553093f878469340", 0x85}, {&(0x7f00000045c0)="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", 0x1000}, {&(0x7f00000055c0)="83874498b6a1e66d6a77424b2bb4d84f1d7137ecc498ef86931566c0dbd459", 0x1f}], 0x3, &(0x7f0000005640)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x11}}], 0x2, 0x140400c0) socket$inet6_udp(0xa, 0x2, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2524.214005][T11803] loop4: detected capacity change from 0 to 224 [ 2524.253442][T11805] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2524.291109][T11805] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:58:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000ff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2524.598103][T11818] loop4: detected capacity change from 0 to 224 14:58:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000fff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2525.019109][T11828] loop4: detected capacity change from 0 to 224 14:58:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000feff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2525.286260][T11841] loop4: detected capacity change from 0 to 224 14:58:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000040000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2525.497623][T11848] loop4: detected capacity change from 0 to 224 [ 2525.963530][T11804] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2525.980270][T11804] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2526.510399][T11806] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 2526.529128][T11806] netlink: 155840 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2527.018700][T11807] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2527.031782][T11807] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2527.473448][T11832] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2527.494543][T11832] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:49 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x7400) 14:58:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000080000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:49 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc601000023b0a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2528.002395][T11913] loop4: detected capacity change from 0 to 224 [ 2528.051414][T11911] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2528.191195][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 2528.197827][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 14:58:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2528.705560][T11927] loop4: detected capacity change from 0 to 224 14:58:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000ffff1f0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2529.002151][T11936] loop4: detected capacity change from 0 to 224 14:58:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffff00000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2529.163169][T11942] loop4: detected capacity change from 0 to 224 14:58:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000100bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2529.366801][T11946] loop4: detected capacity change from 0 to 224 14:58:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2529.542271][T11951] loop4: detected capacity change from 0 to 224 14:58:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2529.719199][T11956] loop4: detected capacity change from 0 to 224 [ 2529.890352][T11914] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2529.904509][T11914] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2530.418194][T11932] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2530.431425][T11932] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:52 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x7a00) 14:58:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2531.195041][T12001] loop4: detected capacity change from 0 to 224 14:58:53 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x200000000000000}, 0x0) 14:58:53 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002320a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:53 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002310a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2531.361070][T12003] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:58:53 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc601000022a0a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2531.463761][T12003] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2531.849564][T12025] loop4: detected capacity change from 0 to 224 14:58:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2532.169151][T12035] loop4: detected capacity change from 0 to 224 14:58:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000700bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2532.349940][T12041] loop4: detected capacity change from 0 to 224 [ 2532.798644][T12015] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2533.311722][T12013] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2533.854131][T12016] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2534.375438][T12032] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2534.391591][T12032] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:58:56 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xf000) 14:58:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:56 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x300}, 0x0) 14:58:56 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002280a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:58:56 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002260a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2534.910232][T12100] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2534.919131][T12100] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2534.960653][T12106] loop4: detected capacity change from 0 to 224 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2535.436668][T12119] loop4: detected capacity change from 0 to 224 [ 2535.560471][T12126] loop4: detected capacity change from 0 to 224 [ 2535.562034][T12116] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000d00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2535.827845][T12133] loop4: detected capacity change from 0 to 224 [ 2536.001819][T12141] loop4: detected capacity change from 0 to 224 14:58:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2537.791047][T12109] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2538.279740][T12111] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2538.684523][T12114] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2538.705205][T12114] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2539.724662][T12138] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2539.736260][T12138] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:01 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x36000) 14:59:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001100bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:01 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002260a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 14:59:01 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x2}, 0x0) 14:59:01 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002240a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2540.199261][T12204] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2540.245761][T12210] loop4: detected capacity change from 0 to 224 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000001f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000102000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000002300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2540.587322][T12231] loop4: detected capacity change from 0 to 224 14:59:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000003f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2540.710584][T12237] loop4: detected capacity change from 0 to 224 [ 2541.722778][T12209] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2542.181382][T12216] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2542.193426][T12216] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2542.697484][T12208] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2542.709748][T12208] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2543.150762][T12247] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2543.163163][T12247] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:05 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) 14:59:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 14:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 14:59:05 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002230a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:05 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002220a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2543.726318][T12307] loop4: detected capacity change from 0 to 224 [ 2543.744600][T12308] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2544.076100][T12322] loop4: detected capacity change from 0 to 224 14:59:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2544.443343][T12331] loop4: detected capacity change from 0 to 224 14:59:06 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffffff}, 0x0) 14:59:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) splice(r0, 0x0, r1, 0x0, 0x10003, 0x0) 14:59:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2544.799436][T12347] loop4: detected capacity change from 0 to 224 14:59:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2544.987899][T12352] loop4: detected capacity change from 0 to 224 [ 2545.413934][T12306] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2546.040274][T12311] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2546.062411][T12311] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2546.558863][T12338] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2546.578693][T12338] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:08 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xc9ffff) 14:59:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:08 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x2}, 0x0) 14:59:08 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc601000021a0a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:08 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002190a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2547.097581][T12405] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2547.108695][T12405] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2547.159020][T12411] loop4: detected capacity change from 0 to 224 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:09 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xf0ffff) 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:09 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x1000000) 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000ffffff8c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2547.636486][T12437] loop4: detected capacity change from 0 to 224 [ 2547.781757][T12443] loop4: detected capacity change from 0 to 224 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000edc000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2547.937223][T12447] loop4: detected capacity change from 0 to 224 14:59:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffff000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2548.108289][T12456] loop4: detected capacity change from 0 to 224 [ 2548.813805][T12413] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:10 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002180a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2549.413648][T12410] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:11 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002170a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2550.056822][T12433] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2550.074455][T12433] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:11 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188010f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffff500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2550.273798][T12508] loop4: detected capacity change from 0 to 224 14:59:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffff600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2550.503173][T12517] loop4: detected capacity change from 0 to 224 14:59:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffdf900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2550.655361][T12521] loop4: detected capacity change from 0 to 224 [ 2551.087282][T12463] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2551.099309][T12463] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:13 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x2000000) 14:59:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffffb00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2551.603929][T12475] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2551.682021][T12551] loop4: detected capacity change from 0 to 224 14:59:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffffe00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000000ff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2551.910135][T12562] loop4: detected capacity change from 0 to 224 14:59:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000fff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2552.079271][T12568] loop4: detected capacity change from 0 to 224 14:59:14 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x2}, 0x0) [ 2552.649019][T12490] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2553.129601][T12509] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2553.142429][T12509] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:14 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188003f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffff7ff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2553.284712][T12603] loop4: detected capacity change from 0 to 224 [ 2553.850803][T12552] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2553.862689][T12552] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:15 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002110a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffffbff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2553.980387][T12629] loop4: detected capacity change from 0 to 224 14:59:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000001fffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2554.191271][T12637] loop4: detected capacity change from 0 to 224 [ 2554.642727][T12575] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2554.659865][T12575] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:16 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x3000000) 14:59:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000f0ffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2555.114007][T12587] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2555.130384][T12587] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2555.180688][T12664] loop4: detected capacity change from 0 to 224 14:59:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fff7ffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fffbffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f9fdffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2555.433322][T12678] loop4: detected capacity change from 0 to 224 [ 2556.094900][T12605] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2556.104093][T12605] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:17 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f0172ad1bd", 0x33fe0}], 0x1}, 0x0) [ 2556.585996][T12630] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. 14:59:18 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188002f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000007fffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2556.717141][T12712] loop4: detected capacity change from 0 to 224 [ 2557.266169][T12665] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2557.277989][T12665] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:19 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc601000020e0a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000008cffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2557.397481][T12736] loop4: detected capacity change from 0 to 224 14:59:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f0ffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2557.772982][T12744] loop4: detected capacity change from 0 to 224 [ 2558.264238][T12684] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2558.284708][T12684] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:20 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4000000) 14:59:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f5ffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2558.781531][T12696] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2558.789860][T12696] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2558.929417][T12776] loop4: detected capacity change from 0 to 224 14:59:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000f6ffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2559.353032][T12785] loop4: detected capacity change from 0 to 224 [ 2559.615873][T12714] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2559.642843][T12714] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000fbffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2559.795838][T12803] loop4: detected capacity change from 0 to 224 14:59:22 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c18802af01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:22 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc601000020d0a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2560.305345][T12737] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2560.838957][T12779] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2560.853212][T12779] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1800000038001901000000000000000f02"], 0x18}}, 0x0) 14:59:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000feffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2560.992119][T12843] loop4: detected capacity change from 0 to 224 14:59:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2561.887208][T12808] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2561.899197][T12808] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:24 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x5000000) 14:59:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000002000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:24 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137353e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2562.317425][T12823] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2562.405254][T12893] loop4: detected capacity change from 0 to 224 14:59:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000003000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2562.711097][T12905] loop4: detected capacity change from 0 to 224 [ 2563.371324][T12824] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2563.379984][T12824] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000004000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1800000038001901000000000060000002"], 0x18}}, 0x0) 14:59:25 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc600a0002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2563.851750][T12895] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2563.875650][T12895] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:25 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60020002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2563.967343][T12943] loop4: detected capacity change from 0 to 224 14:59:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000005000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2564.196047][T12954] loop4: detected capacity change from 0 to 224 14:59:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000006000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2564.378387][T12961] loop4: detected capacity change from 0 to 224 [ 2564.837730][T12891] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2564.849565][T12891] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2565.349218][T12915] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2565.366448][T12915] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2565.902783][T12949] netlink: 212940 bytes leftover after parsing attributes in process `syz-executor.5'. 14:59:27 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x6000000) 14:59:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000007000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:27 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c6394350424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2566.041422][T13005] loop4: detected capacity change from 0 to 224 14:59:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000008000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2566.257217][T13013] loop4: detected capacity change from 0 to 224 14:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000009000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2566.413496][T13020] loop4: detected capacity change from 0 to 224 14:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2566.550108][T13024] loop4: detected capacity change from 0 to 224 [ 2566.798986][T12945] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.3'. 14:59:29 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030729000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000d000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:29 executing program 5: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029003505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 2567.408189][T13007] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2567.424684][T13007] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2567.563060][T13061] loop4: detected capacity change from 0 to 224 14:59:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000000f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2567.855233][T13073] loop4: detected capacity change from 0 to 224 [ 2568.341727][T13004] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2568.353792][T13004] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2568.799668][T13042] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2568.811568][T13042] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:31 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x7000000) 14:59:31 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f040029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000010000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:31 executing program 0: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2569.294218][T13059] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 2569.313107][T13059] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2569.418461][T13114] loop4: detected capacity change from 0 to 224 14:59:31 executing program 3: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e029030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 14:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000011000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000018000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2569.655944][T13127] loop4: detected capacity change from 0 to 224 14:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000023000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2569.791261][T13134] loop4: detected capacity change from 0 to 224 14:59:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000043000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2569.896152][T13138] loop4: detected capacity change from 0 to 224 [ 2570.037284][T13146] loop4: detected capacity change from 0 to 224 14:59:32 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000045000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2570.647328][T13116] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 2570.655911][T13116] netlink: 144312 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2570.747520][T13164] loop4: detected capacity change from 0 to 224 [ 2570.765638][T13166] FAULT_INJECTION: forcing a failure. [ 2570.765638][T13166] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.792024][T13166] CPU: 1 PID: 13166 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2570.800902][T13166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2570.810959][T13166] Call Trace: [ 2570.814238][T13166] dump_stack_lvl+0xcd/0x134 [ 2570.818837][T13166] should_fail.cold+0x5/0xa [ 2570.823352][T13166] ? qrtr_tun_write_iter+0xbf/0x1a0 [ 2570.828554][T13166] should_failslab+0x5/0x10 [ 2570.833098][T13166] __kmalloc+0x72/0x330 [ 2570.837260][T13166] qrtr_tun_write_iter+0xbf/0x1a0 [ 2570.842298][T13166] new_sync_write+0x426/0x650 [ 2570.847125][T13166] ? new_sync_read+0x6e0/0x6e0 [ 2570.851897][T13166] ? lock_downgrade+0x6e0/0x6e0 [ 2570.856749][T13166] ? down_read_nested+0x360/0x450 [ 2570.861782][T13166] ? apparmor_file_permission+0x264/0x4e0 [ 2570.867517][T13166] vfs_write+0x75a/0xa40 [ 2570.871764][T13166] ksys_write+0x12d/0x250 [ 2570.876085][T13166] ? __ia32_sys_read+0xb0/0xb0 [ 2570.880843][T13166] ? syscall_enter_from_user_mode+0x21/0x70 [ 2570.886733][T13166] do_syscall_64+0x35/0xb0 [ 2570.891147][T13166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2570.897033][T13166] RIP: 0033:0x4665e9 [ 2570.900915][T13166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2570.920516][T13166] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2570.928921][T13166] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2570.936884][T13166] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2570.944847][T13166] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2570.952807][T13166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2570.960771][T13166] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 [ 2571.467930][T13119] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2571.485617][T13119] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2572.016587][T13126] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 2572.028258][T13126] netlink: 204216 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2572.507276][T13152] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2572.523235][T13152] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:34 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x8000000) 14:59:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000048000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:34 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:34 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0) 14:59:34 executing program 3 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2573.003817][T13218] FAULT_INJECTION: forcing a failure. [ 2573.003817][T13218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2573.017968][T13218] CPU: 1 PID: 13218 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2573.027076][T13218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2573.037222][T13218] Call Trace: [ 2573.040501][T13218] dump_stack_lvl+0xcd/0x134 [ 2573.045108][T13218] should_fail.cold+0x5/0xa [ 2573.049710][T13218] _copy_from_iter+0x389/0x1320 [ 2573.054586][T13218] ? hash_and_copy_to_iter+0x200/0x200 [ 2573.060056][T13218] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2573.066305][T13218] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2573.072551][T13218] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2573.078793][T13218] ? __phys_addr+0xc4/0x140 [ 2573.083299][T13218] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2573.089540][T13218] ? __phys_addr_symbol+0x2c/0x70 [ 2573.094570][T13218] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2573.100288][T13218] ? __check_object_size+0x16e/0x3f0 [ 2573.105577][T13218] qrtr_tun_write_iter+0xff/0x1a0 [ 2573.110614][T13218] new_sync_write+0x426/0x650 [ 2573.115295][T13218] ? new_sync_read+0x6e0/0x6e0 [ 2573.120060][T13218] ? lock_downgrade+0x6e0/0x6e0 [ 2573.124907][T13218] ? down_read_nested+0x360/0x450 [ 2573.129938][T13218] ? apparmor_file_permission+0x264/0x4e0 [ 2573.135765][T13218] vfs_write+0x75a/0xa40 [ 2573.140003][T13218] ksys_write+0x12d/0x250 [ 2573.144337][T13218] ? __ia32_sys_read+0xb0/0xb0 [ 2573.149105][T13218] ? syscall_enter_from_user_mode+0x21/0x70 [ 2573.155003][T13218] do_syscall_64+0x35/0xb0 [ 2573.159417][T13218] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2573.165307][T13218] RIP: 0033:0x4665e9 [ 2573.169196][T13218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2573.188889][T13218] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2573.197388][T13218] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2573.205440][T13218] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2573.213403][T13218] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.221366][T13218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2573.229330][T13218] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 14:59:35 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2573.261314][T13225] loop4: detected capacity change from 0 to 224 [ 2573.277532][T13227] FAULT_INJECTION: forcing a failure. [ 2573.277532][T13227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2573.296665][T13224] FAULT_INJECTION: forcing a failure. [ 2573.296665][T13224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2573.356681][T13233] FAULT_INJECTION: forcing a failure. [ 2573.356681][T13233] name failslab, interval 1, probability 0, space 0, times 0 [ 2573.364207][T13224] CPU: 0 PID: 13224 Comm: syz-executor.3 Not tainted 5.14.0-rc4-syzkaller #0 [ 2573.378139][T13224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2573.388413][T13224] Call Trace: [ 2573.391784][T13224] dump_stack_lvl+0xcd/0x134 [ 2573.396398][T13224] should_fail.cold+0x5/0xa [ 2573.400924][T13224] _copy_from_user+0x2c/0x180 [ 2573.405619][T13224] __copy_msghdr_from_user+0x91/0x4b0 [ 2573.411098][T13224] ? __ia32_sys_shutdown+0x70/0x70 [ 2573.416222][T13224] ? mark_lock+0xef/0x17b0 [ 2573.420643][T13224] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2573.426636][T13224] sendmsg_copy_msghdr+0xa1/0x160 [ 2573.431667][T13224] ? do_recvmmsg+0x6d0/0x6d0 [ 2573.436360][T13224] ? lock_chain_count+0x20/0x20 [ 2573.441224][T13224] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2573.447224][T13224] ___sys_sendmsg+0xc6/0x170 [ 2573.451827][T13224] ? sendmsg_copy_msghdr+0x160/0x160 [ 2573.457122][T13224] ? __fget_files+0x21b/0x3e0 [ 2573.461816][T13224] ? lock_downgrade+0x6e0/0x6e0 [ 2573.466693][T13224] ? __fget_files+0x23d/0x3e0 [ 2573.471396][T13224] ? __fget_light+0xea/0x280 [ 2573.476010][T13224] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2573.482286][T13224] __sys_sendmsg+0xe5/0x1b0 [ 2573.486807][T13224] ? __sys_sendmsg_sock+0x30/0x30 [ 2573.491850][T13224] ? syscall_enter_from_user_mode+0x21/0x70 [ 2573.497760][T13224] do_syscall_64+0x35/0xb0 [ 2573.502185][T13224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2573.508079][T13224] RIP: 0033:0x4665e9 [ 2573.511966][T13224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2573.531781][T13224] RSP: 002b:00007fbba2243188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2573.540199][T13224] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2573.548170][T13224] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 2573.556130][T13224] RBP: 00007fbba22431d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.564094][T13224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2573.572055][T13224] R13: 00007fffdc187b2f R14: 00007fbba2243300 R15: 0000000000022000 [ 2573.580089][T13233] CPU: 1 PID: 13233 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2573.588860][T13233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2573.595533][T13230] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2573.598913][T13233] Call Trace: [ 2573.598925][T13233] dump_stack_lvl+0xcd/0x134 [ 2573.598961][T13233] should_fail.cold+0x5/0xa [ 2573.598990][T13233] should_failslab+0x5/0x10 [ 2573.599015][T13233] kmem_cache_alloc_node+0x65/0x3e0 [ 2573.599043][T13233] ? __alloc_skb+0x20b/0x340 [ 2573.599068][T13233] __alloc_skb+0x20b/0x340 [ 2573.599087][T13233] ? hash_and_copy_to_iter+0x200/0x200 [ 2573.599118][T13233] __netdev_alloc_skb+0x73/0x400 [ 2573.599141][T13233] qrtr_endpoint_post+0x84/0x1240 [ 2573.599165][T13233] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2573.599187][T13233] ? __check_object_size+0x16e/0x3f0 [ 2573.599213][T13233] qrtr_tun_write_iter+0x125/0x1a0 [ 2573.599240][T13233] new_sync_write+0x426/0x650 [ 2573.599277][T13233] ? new_sync_read+0x6e0/0x6e0 [ 2573.599303][T13233] ? lock_downgrade+0x6e0/0x6e0 [ 2573.599322][T13233] ? down_read_nested+0x360/0x450 [ 2573.599349][T13233] ? apparmor_file_permission+0x264/0x4e0 [ 2573.599387][T13233] vfs_write+0x75a/0xa40 [ 2573.599414][T13233] ksys_write+0x12d/0x250 [ 2573.599439][T13233] ? __ia32_sys_read+0xb0/0xb0 [ 2573.599466][T13233] ? syscall_enter_from_user_mode+0x21/0x70 [ 2573.599498][T13233] do_syscall_64+0x35/0xb0 [ 2573.599521][T13233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2573.599543][T13233] RIP: 0033:0x4665e9 [ 2573.599560][T13233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:59:35 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0) [ 2573.599580][T13233] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2573.599602][T13233] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2573.599616][T13233] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2573.599628][T13233] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2573.599642][T13233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2573.599655][T13233] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 [ 2573.869576][T13227] CPU: 0 PID: 13227 Comm: syz-executor.0 Not tainted 5.14.0-rc4-syzkaller #0 [ 2573.878380][T13227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2573.878387][T13240] FAULT_INJECTION: forcing a failure. [ 2573.878387][T13240] name failslab, interval 1, probability 0, space 0, times 0 [ 2573.888433][T13227] Call Trace: [ 2573.888448][T13227] dump_stack_lvl+0xcd/0x134 [ 2573.888479][T13227] should_fail.cold+0x5/0xa [ 2573.888503][T13227] _copy_from_user+0x2c/0x180 [ 2573.918073][T13227] __sys_bpf+0x2ed/0x53b0 [ 2573.922424][T13227] ? bpf_link_get_from_fd+0x110/0x110 [ 2573.927824][T13227] ? find_held_lock+0x2d/0x110 [ 2573.932625][T13227] ? trace_hardirqs_on+0x38/0x1c0 [ 2573.937668][T13227] __x64_sys_bpf+0x75/0xb0 [ 2573.942090][T13227] ? syscall_enter_from_user_mode+0x21/0x70 [ 2573.947997][T13227] do_syscall_64+0x35/0xb0 [ 2573.952424][T13227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2573.958327][T13227] RIP: 0033:0x4665e9 [ 2573.962229][T13227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2573.982086][T13227] RSP: 002b:00007f3012b8f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2573.990514][T13227] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 [ 2573.998495][T13227] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 000000000000000a [ 2574.006478][T13227] RBP: 00007f3012b8f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2574.014466][T13227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2574.022443][T13227] R13: 00007ffd75db53cf R14: 00007f3012b8f300 R15: 0000000000022000 [ 2574.031265][T13240] CPU: 1 PID: 13240 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2574.040050][T13240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2574.050394][T13240] Call Trace: [ 2574.053669][T13240] dump_stack_lvl+0xcd/0x134 [ 2574.058275][T13240] should_fail.cold+0x5/0xa [ 2574.062798][T13240] should_failslab+0x5/0x10 [ 2574.067305][T13240] __kmalloc_node_track_caller+0x7d/0x360 [ 2574.073030][T13240] ? __netdev_alloc_skb+0x73/0x400 [ 2574.078150][T13240] __alloc_skb+0xde/0x340 [ 2574.082484][T13240] __netdev_alloc_skb+0x73/0x400 [ 2574.087432][T13240] qrtr_endpoint_post+0x84/0x1240 [ 2574.092465][T13240] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2574.098193][T13240] ? __check_object_size+0x16e/0x3f0 [ 2574.103493][T13240] qrtr_tun_write_iter+0x125/0x1a0 [ 2574.108612][T13240] new_sync_write+0x426/0x650 [ 2574.113293][T13240] ? new_sync_read+0x6e0/0x6e0 [ 2574.118067][T13240] ? lock_downgrade+0x6e0/0x6e0 [ 2574.122919][T13240] ? down_read_nested+0x360/0x450 [ 2574.127956][T13240] ? apparmor_file_permission+0x264/0x4e0 [ 2574.133692][T13240] vfs_write+0x75a/0xa40 [ 2574.137938][T13240] ksys_write+0x12d/0x250 [ 2574.142259][T13240] ? __ia32_sys_read+0xb0/0xb0 [ 2574.147450][T13240] ? syscall_enter_from_user_mode+0x21/0x70 [ 2574.153344][T13240] do_syscall_64+0x35/0xb0 [ 2574.157754][T13240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2574.163993][T13240] RIP: 0033:0x4665e9 [ 2574.167876][T13240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2574.187475][T13240] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2574.195879][T13240] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2574.203839][T13240] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2574.212344][T13240] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 14:59:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) close(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0) 14:59:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000004c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2574.220304][T13240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2574.228265][T13240] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 14:59:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2574.349493][T13251] loop4: detected capacity change from 0 to 224 [ 2574.759957][T13230] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2575.303811][T13245] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2575.329506][T13245] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:37 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x9000000) 14:59:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000068000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:37 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2575.833499][T13283] FAULT_INJECTION: forcing a failure. [ 2575.833499][T13283] name failslab, interval 1, probability 0, space 0, times 0 [ 2575.847382][T13283] CPU: 1 PID: 13283 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2575.856166][T13283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2575.866239][T13283] Call Trace: [ 2575.869525][T13283] dump_stack_lvl+0xcd/0x134 [ 2575.874131][T13283] should_fail.cold+0x5/0xa [ 2575.878648][T13283] ? radix_tree_node_alloc.constprop.0+0x1e4/0x350 [ 2575.885158][T13283] should_failslab+0x5/0x10 [ 2575.889664][T13283] kmem_cache_alloc+0x5e/0x4a0 [ 2575.894430][T13283] radix_tree_node_alloc.constprop.0+0x1e4/0x350 [ 2575.900768][T13283] radix_tree_insert+0x23b/0x640 [ 2575.905722][T13283] qrtr_endpoint_post+0x635/0x1240 [ 2575.910840][T13283] qrtr_tun_write_iter+0x125/0x1a0 [ 2575.915954][T13283] new_sync_write+0x426/0x650 [ 2575.920635][T13283] ? new_sync_read+0x6e0/0x6e0 [ 2575.925401][T13283] ? lock_downgrade+0x6e0/0x6e0 [ 2575.930246][T13283] ? down_read_nested+0x360/0x450 [ 2575.935272][T13283] ? apparmor_file_permission+0x264/0x4e0 [ 2575.941004][T13283] vfs_write+0x75a/0xa40 [ 2575.945253][T13283] ksys_write+0x12d/0x250 [ 2575.949586][T13283] ? __ia32_sys_read+0xb0/0xb0 [ 2575.954358][T13283] ? syscall_enter_from_user_mode+0x21/0x70 [ 2575.960265][T13283] do_syscall_64+0x35/0xb0 [ 2575.964688][T13283] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2575.970594][T13283] RIP: 0033:0x4665e9 [ 2575.974494][T13283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2575.994109][T13283] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2576.002531][T13283] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 2576.010499][T13283] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2576.018466][T13283] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2576.026435][T13283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:59:37 executing program 5 (fault-call:2 fault-nth:5): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2576.034784][T13283] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 [ 2576.059487][T13288] loop4: detected capacity change from 0 to 224 [ 2576.149709][T13292] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2576.154551][T13296] FAULT_INJECTION: forcing a failure. [ 2576.154551][T13296] name failslab, interval 1, probability 0, space 0, times 0 [ 2576.170493][T13296] CPU: 1 PID: 13296 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2576.179260][T13296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2576.189318][T13296] Call Trace: [ 2576.192598][T13296] dump_stack_lvl+0xcd/0x134 [ 2576.195436][T13292] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2576.197200][T13296] should_fail.cold+0x5/0xa [ 2576.197221][T13296] ? radix_tree_node_alloc.constprop.0+0x1e4/0x350 [ 2576.197242][T13296] should_failslab+0x5/0x10 [ 2576.197259][T13296] kmem_cache_alloc+0x5e/0x4a0 [ 2576.197278][T13296] radix_tree_node_alloc.constprop.0+0x1e4/0x350 [ 2576.197300][T13296] radix_tree_insert+0x23b/0x640 [ 2576.197322][T13296] qrtr_endpoint_post+0x635/0x1240 [ 2576.197345][T13296] qrtr_tun_write_iter+0x125/0x1a0 [ 2576.197365][T13296] new_sync_write+0x426/0x650 [ 2576.197384][T13296] ? new_sync_read+0x6e0/0x6e0 [ 2576.197407][T13296] ? lock_downgrade+0x6e0/0x6e0 [ 2576.197427][T13296] ? down_read_nested+0x360/0x450 [ 2576.197458][T13296] ? apparmor_file_permission+0x264/0x4e0 [ 2576.197496][T13296] vfs_write+0x75a/0xa40 [ 2576.273580][T13296] ksys_write+0x12d/0x250 [ 2576.273616][T13296] ? __ia32_sys_read+0xb0/0xb0 [ 2576.273646][T13296] ? syscall_enter_from_user_mode+0x21/0x70 [ 2576.273679][T13296] do_syscall_64+0x35/0xb0 [ 2576.273701][T13296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2576.273719][T13296] RIP: 0033:0x4665e9 [ 2576.307331][T13296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2576.326940][T13296] RSP: 002b:00007f88a1b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2576.335351][T13296] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 14:59:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000006c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2576.343318][T13296] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000003 [ 2576.351284][T13296] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2576.359251][T13296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2576.367214][T13296] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 [ 2576.599843][T13307] loop4: detected capacity change from 0 to 224 14:59:38 executing program 5 (fault-call:2 fault-nth:6): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000074000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2576.871384][T13313] FAULT_INJECTION: forcing a failure. [ 2576.871384][T13313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2576.907878][T13313] CPU: 1 PID: 13313 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 2576.916685][T13313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2576.926752][T13313] Call Trace: [ 2576.930031][T13313] dump_stack_lvl+0xcd/0x134 [ 2576.934627][T13313] should_fail.cold+0x5/0xa [ 2576.939133][T13313] _copy_to_user+0x2c/0x150 [ 2576.943647][T13313] simple_read_from_buffer+0xcc/0x160 [ 2576.949034][T13313] proc_fail_nth_read+0x187/0x220 [ 2576.954069][T13313] ? proc_fault_inject_read+0x220/0x220 [ 2576.959621][T13313] ? security_file_permission+0x248/0x560 [ 2576.965358][T13313] ? proc_fault_inject_read+0x220/0x220 [ 2576.970915][T13313] vfs_read+0x1b5/0x570 [ 2576.975084][T13313] ksys_read+0x12d/0x250 [ 2576.979337][T13313] ? vfs_write+0xa40/0xa40 [ 2576.983769][T13313] ? syscall_enter_from_user_mode+0x21/0x70 [ 2576.989686][T13313] do_syscall_64+0x35/0xb0 [ 2576.994112][T13313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2577.000006][T13313] RIP: 0033:0x41936c [ 2577.003899][T13313] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2577.023722][T13313] RSP: 002b:00007f88a1b4a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2577.032151][T13313] RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 000000000041936c [ 2577.040124][T13313] RDX: 000000000000000f RSI: 00007f88a1b4a1e0 RDI: 0000000000000005 [ 2577.048092][T13313] RBP: 00007f88a1b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2577.056064][T13313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2577.064036][T13313] R13: 00007ffcae6badef R14: 00007f88a1b4a300 R15: 0000000000022000 [ 2577.173918][T13323] loop4: detected capacity change from 0 to 224 14:59:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) [ 2578.030900][T13316] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2578.042977][T13316] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:40 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xb120000) 14:59:40 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202000202020202020202020202020000000007a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:40 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0321213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:40 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0721213998aaf000400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2578.628835][T13364] loop4: detected capacity change from 0 to 224 [ 2578.698548][T13372] qrtr: Invalid version 7 [ 2578.728003][T13375] qrtr: Invalid version 7 14:59:40 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf002400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2578.768619][T13373] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:59:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000f0000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2578.849768][T13373] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2579.178467][T13395] loop4: detected capacity change from 0 to 224 [ 2579.934072][T13403] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2579.950839][T13403] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x191) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:42 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf003400300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000fe000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:42 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0xe000000) 14:59:42 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf004400300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2580.607322][T13432] loop4: detected capacity change from 0 to 224 14:59:42 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000c00300000000065219568600000000000000ff7ffeffffff", 0x20) [ 2580.715762][T13434] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:59:42 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000c00300000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x5, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:42 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2580.818394][T13434] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:42 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400200000000065219568600000000000000ff7ffeffffff", 0x20) [ 2581.883791][T13471] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2581.907439][T13471] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000030000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:45 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400302000000065219568600000000000000ff7ffeffffff", 0x20) 14:59:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x6, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:45 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x1f000000) 14:59:45 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400303000000065219568600000000000000ff7ffeffffff", 0x20) [ 2583.701747][T13500] loop4: detected capacity change from 0 to 224 14:59:45 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400304000000065219568600000000000000ff7ffeffffff", 0x20) [ 2583.750278][T13497] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2583.799814][T13497] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x7, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:45 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300030000065219568600000000000000ff7ffeffffff", 0x20) 14:59:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000050000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2584.443046][T13534] loop4: detected capacity change from 0 to 224 [ 2585.121742][T13538] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2585.134457][T13538] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:48 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003003f0000065219568600000000000000ff7ffeffffff", 0x20) 14:59:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x9, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000060000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:48 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x3f000000) 14:59:48 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300400300065219568600000000000000ff7ffeffffff", 0x20) [ 2586.802882][T13568] loop4: detected capacity change from 0 to 224 [ 2586.814083][T13566] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:59:48 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300034000065219568600000000000000ff7ffeffffff", 0x20) [ 2586.874935][T13566] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0xf, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:48 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000001065219568600000000000000ff7ffeffffff", 0x20) 14:59:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000070000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) [ 2587.701901][T13606] loop4: detected capacity change from 0 to 224 [ 2588.273083][T13604] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2588.285138][T13604] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2589.625861][ T3260] ieee802154 phy0 wpan0: encryption failed: -22 [ 2589.632459][ T3260] ieee802154 phy1 wpan1: encryption failed: -22 14:59:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002400)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0) 14:59:51 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000002065219568600000000000000ff7ffeffffff", 0x20) 14:59:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x60, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000090000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:51 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x40000000) 14:59:51 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000003065219568600000000000000ff7ffeffffff", 0x20) [ 2589.948129][T13641] loop4: detected capacity change from 0 to 224 [ 2590.019321][T13642] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 14:59:51 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000004065219568600000000000000ff7ffeffffff", 0x20) [ 2590.074143][T13642] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0xf0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:51 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf00040030000003f065219568600000000000000ff7ffeffffff", 0x20) 14:59:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002400)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0) 14:59:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000a0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:52 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300020000065219568600000000000000ff7ffeffffff", 0x20) 14:59:52 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300030000065219568600000000000000ff7ffeffffff", 0x20) 14:59:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x300, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 2590.589720][T13679] loop4: detected capacity change from 0 to 224 [ 2591.387297][T13691] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2591.404010][T13691] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:53 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x48000000) 14:59:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002400)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0) 14:59:53 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300040000065219568600000000000000ff7ffeffffff", 0x20) 14:59:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x500, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:53 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000300065219568600000000000000ff7ffeffffff", 0x20) 14:59:53 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300003f00065219568600000000000000ff7ffeffffff", 0x20) [ 2592.070954][T13733] loop4: detected capacity change from 0 to 224 14:59:53 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf0004003000000003f5219568600000000000000ff7ffeffffff", 0x20) 14:59:53 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 14:59:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x600, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 2592.251611][T13741] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2592.328391][T13741] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2593.400131][T13768] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 2593.413488][T13768] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 14:59:55 executing program 1: r0 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r0, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x6, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x102, 0x0, 0x0, 0x0, 0x0, 0x6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = getpid() process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f00000002c0)=""/173, 0xad}], 0x2, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/184, 0xb8}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000014c0)=ANY=[]) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x4c000000) 14:59:55 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000200065219568600000000000000ff7ffeffffff", 0x20) 14:59:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020200020202020202020202020202000000000000d0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000080)={[{@map_off}]}) 14:59:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x700, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 14:59:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000010000000000000000049000885000000410000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14:59:55 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000300065219568600000000000000ff7ffeffffff", 0x20) 14:59:55 executing program 5: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x182) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$qrtrtun(r0, &(0x7f0000000000)="0121213998aaf000400300000400065219568600000000000000ff7ffeffffff", 0x20) [ 2593.963866][T13794] loop4: detected capacity change from 0 to 224 [ 2594.057759][T16442] ------------[ cut here ]------------ [ 2594.063568][T16442] refcount_t: addition on 0; use-after-free. [ 2594.069724][T16442] WARNING: CPU: 0 PID: 16442 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 [ 2594.079398][T16442] Modules linked in: [ 2594.083482][T16442] CPU: 0 PID: 16442 Comm: kworker/u4:7 Not tainted 5.14.0-rc4-syzkaller #0 [ 2594.092043][T16442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.102078][T16442] Workqueue: qrtr_ns_handler qrtr_ns_worker [ 2594.107953][T16442] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 [ 2594.114085][T16442] Code: 09 31 ff 89 de e8 37 45 9f fd 84 db 0f 85 36 ff ff ff e8 ea 3e 9f fd 48 c7 c7 c0 75 e3 89 c6 05 35 a6 81 09 01 e8 41 a4 11 05 <0f> 0b e9 17 ff ff ff e8 cb 3e 9f fd 0f b6 1d 1a a6 81 09 31 ff 89 [ 2594.133670][T16442] RSP: 0018:ffffc9000a59fa00 EFLAGS: 00010082 [ 2594.139712][T16442] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2594.147660][T16442] RDX: ffff888016560000 RSI: ffffffff815d89a5 RDI: fffff520014b3f32 [ 2594.155608][T16442] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 2594.163555][T16442] R10: ffffffff815d27de R11: 0000000000000000 R12: ffff888015bf0000 [ 2594.171592][T16442] R13: ffff88814e5e0400 R14: ffff8880a05fca30 R15: ffff8880a05fca34 [ 2594.179540][T16442] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 2594.188447][T16442] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2594.195007][T16442] CR2: 000000000050e070 CR3: 0000000075c15000 CR4: 0000000000350ef0 [ 2594.202956][T16442] Call Trace: [ 2594.206217][T16442] qrtr_recvmsg+0x85a/0x990 [ 2594.210704][T16442] ? qrtr_node_enqueue+0x12e0/0x12e0 [ 2594.215974][T16442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2594.222193][T16442] ? security_socket_recvmsg+0x8f/0xc0 [ 2594.227632][T16442] ? qrtr_node_enqueue+0x12e0/0x12e0 [ 2594.232896][T16442] kernel_recvmsg+0x110/0x160 [ 2594.237556][T16442] qrtr_ns_worker+0x15a/0x1720 [ 2594.242300][T16442] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2594.248257][T16442] ? lock_downgrade+0x6e0/0x6e0 [ 2594.253090][T16442] ? ctrl_cmd_bye+0xc50/0xc50 [ 2594.257761][T16442] process_one_work+0x98d/0x1630 [ 2594.262682][T16442] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2594.268100][T16442] ? rwlock_bug.part.0+0x90/0x90 [ 2594.273013][T16442] ? _raw_spin_lock_irq+0x41/0x50 [ 2594.278018][T16442] worker_thread+0x658/0x11f0 [ 2594.282677][T16442] ? process_one_work+0x1630/0x1630 [ 2594.288117][T16442] kthread+0x3e5/0x4d0 [ 2594.292165][T16442] ? set_kthread_struct+0x130/0x130 [ 2594.297349][T16442] ret_from_fork+0x1f/0x30 [ 2594.301771][T16442] Kernel panic - not syncing: panic_on_warn set ... [ 2594.308329][T16442] CPU: 0 PID: 16442 Comm: kworker/u4:7 Not tainted 5.14.0-rc4-syzkaller #0 [ 2594.316894][T16442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.326926][T16442] Workqueue: qrtr_ns_handler qrtr_ns_worker [ 2594.332801][T16442] Call Trace: [ 2594.336064][T16442] dump_stack_lvl+0xcd/0x134 [ 2594.340636][T16442] panic+0x306/0x73d [ 2594.344515][T16442] ? __warn_printk+0xf3/0xf3 [ 2594.349086][T16442] ? __warn.cold+0x1a/0x44 [ 2594.353480][T16442] ? refcount_warn_saturate+0x169/0x1e0 [ 2594.359004][T16442] __warn.cold+0x35/0x44 [ 2594.363225][T16442] ? refcount_warn_saturate+0x169/0x1e0 [ 2594.368844][T16442] report_bug+0x1bd/0x210 [ 2594.373164][T16442] handle_bug+0x3c/0x60 [ 2594.377300][T16442] exc_invalid_op+0x14/0x40 [ 2594.381784][T16442] asm_exc_invalid_op+0x12/0x20 [ 2594.386613][T16442] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 [ 2594.392746][T16442] Code: 09 31 ff 89 de e8 37 45 9f fd 84 db 0f 85 36 ff ff ff e8 ea 3e 9f fd 48 c7 c7 c0 75 e3 89 c6 05 35 a6 81 09 01 e8 41 a4 11 05 <0f> 0b e9 17 ff ff ff e8 cb 3e 9f fd 0f b6 1d 1a a6 81 09 31 ff 89 [ 2594.412416][T16442] RSP: 0018:ffffc9000a59fa00 EFLAGS: 00010082 [ 2594.418462][T16442] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2594.426409][T16442] RDX: ffff888016560000 RSI: ffffffff815d89a5 RDI: fffff520014b3f32 [ 2594.434359][T16442] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 2594.442306][T16442] R10: ffffffff815d27de R11: 0000000000000000 R12: ffff888015bf0000 [ 2594.450610][T16442] R13: ffff88814e5e0400 R14: ffff8880a05fca30 R15: ffff8880a05fca34 [ 2594.458562][T16442] ? wake_up_klogd.part.0+0x8e/0xd0 [ 2594.463739][T16442] ? vprintk+0x95/0x260 [ 2594.467876][T16442] qrtr_recvmsg+0x85a/0x990 [ 2594.472363][T16442] ? qrtr_node_enqueue+0x12e0/0x12e0 [ 2594.477652][T16442] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2594.483873][T16442] ? security_socket_recvmsg+0x8f/0xc0 [ 2594.489331][T16442] ? qrtr_node_enqueue+0x12e0/0x12e0 [ 2594.494613][T16442] kernel_recvmsg+0x110/0x160 [ 2594.499445][T16442] qrtr_ns_worker+0x15a/0x1720 [ 2594.504195][T16442] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2594.510153][T16442] ? lock_downgrade+0x6e0/0x6e0 [ 2594.514981][T16442] ? ctrl_cmd_bye+0xc50/0xc50 [ 2594.519662][T16442] process_one_work+0x98d/0x1630 [ 2594.524592][T16442] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2594.529947][T16442] ? rwlock_bug.part.0+0x90/0x90 [ 2594.534860][T16442] ? _raw_spin_lock_irq+0x41/0x50 [ 2594.539865][T16442] worker_thread+0x658/0x11f0 [ 2594.544535][T16442] ? process_one_work+0x1630/0x1630 [ 2594.549718][T16442] kthread+0x3e5/0x4d0 [ 2594.553767][T16442] ? set_kthread_struct+0x130/0x130 [ 2594.558943][T16442] ret_from_fork+0x1f/0x30 [ 2595.658451][T16442] Shutting down cpus with NMI [ 2595.670116][T16442] Kernel Offset: disabled [ 2595.674857][T16442] Rebooting in 86400 seconds..