[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2021/05/10 11:15:01 fuzzer started 2021/05/10 11:15:01 dialing manager at 10.128.0.163:43317 2021/05/10 11:15:01 syscalls: 1982 2021/05/10 11:15:01 code coverage: enabled 2021/05/10 11:15:01 comparison tracing: enabled 2021/05/10 11:15:01 extra coverage: enabled 2021/05/10 11:15:01 setuid sandbox: enabled 2021/05/10 11:15:01 namespace sandbox: enabled 2021/05/10 11:15:01 Android sandbox: enabled 2021/05/10 11:15:01 fault injection: enabled 2021/05/10 11:15:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/10 11:15:01 net packet injection: /dev/net/tun does not exist 2021/05/10 11:15:01 net device setup: enabled 2021/05/10 11:15:01 concurrency sanitizer: enabled 2021/05/10 11:15:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/10 11:15:01 USB emulation: /dev/raw-gadget does not exist 2021/05/10 11:15:01 hci packet injection: /dev/vhci does not exist 2021/05/10 11:15:01 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/05/10 11:15:01 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/05/10 11:15:03 suppressing KCSAN reports in functions: 'do_readlinkat' '__find_get_block' 'mb_mark_used' 'futex_wait_queue_me' 'fast_dput' '__delete_from_page_cache' 'n_tty_receive_buf_common' 'generic_write_end' 'do_nanosleep' '__ext4_new_inode' 'xas_clear_mark' 'lookup_fast' 'blk_mq_dispatch_rq_list' 'copy_process' '__xa_clear_mark' 'ext4_ext_try_to_merge_right' 'step_into' 'blk_mq_rq_ctx_init' 'do_signal_stop' 'do_select' '__mark_inode_dirty' '__xa_set_mark' 'tick_nohz_next_event' 'kauditd_thread' 'expire_timers' 'get_signal' 'ext4_sync_file' 'dd_has_work' 'audit_log_start' '_find_next_bit' 'ext4_ext_handle_unwritten_extents' 'alloc_pid' 'blk_mq_sched_dispatch_requests' 'ext4_free_inodes_count' 2021/05/10 11:15:03 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/10 11:15:03 fetching corpus: 48, signal 11602/15446 (executing program) 2021/05/10 11:15:03 fetching corpus: 98, signal 20156/25713 (executing program) 2021/05/10 11:15:03 fetching corpus: 148, signal 25951/33205 (executing program) 2021/05/10 11:15:03 fetching corpus: 198, signal 30331/39265 (executing program) 2021/05/10 11:15:03 fetching corpus: 248, signal 36340/46821 (executing program) 2021/05/10 11:15:03 fetching corpus: 298, signal 40361/52374 (executing program) 2021/05/10 11:15:03 fetching corpus: 348, signal 42121/55751 (executing program) 2021/05/10 11:15:03 fetching corpus: 398, signal 45010/60164 (executing program) 2021/05/10 11:15:03 fetching corpus: 448, signal 49984/66528 (executing program) 2021/05/10 11:15:03 fetching corpus: 498, signal 53475/71358 (executing program) 2021/05/10 11:15:03 fetching corpus: 548, signal 56161/75423 (executing program) 2021/05/10 11:15:03 fetching corpus: 598, signal 59249/79791 (executing program) 2021/05/10 11:15:03 fetching corpus: 648, signal 61551/83470 (executing program) 2021/05/10 11:15:03 fetching corpus: 698, signal 63378/86644 (executing program) 2021/05/10 11:15:03 fetching corpus: 748, signal 65409/89991 (executing program) 2021/05/10 11:15:03 fetching corpus: 798, signal 67068/92986 (executing program) 2021/05/10 11:15:03 fetching corpus: 848, signal 68916/96120 (executing program) 2021/05/10 11:15:03 fetching corpus: 898, signal 70825/99290 (executing program) 2021/05/10 11:15:03 fetching corpus: 948, signal 72257/102044 (executing program) 2021/05/10 11:15:03 fetching corpus: 998, signal 73557/104666 (executing program) 2021/05/10 11:15:04 fetching corpus: 1048, signal 77244/109244 (executing program) 2021/05/10 11:15:04 fetching corpus: 1098, signal 78710/111967 (executing program) 2021/05/10 11:15:04 fetching corpus: 1148, signal 80177/114595 (executing program) 2021/05/10 11:15:04 fetching corpus: 1198, signal 81603/117212 (executing program) 2021/05/10 11:15:04 fetching corpus: 1248, signal 82909/119688 (executing program) 2021/05/10 11:15:04 fetching corpus: 1298, signal 83961/121974 (executing program) 2021/05/10 11:15:04 fetching corpus: 1348, signal 84863/124088 (executing program) 2021/05/10 11:15:04 fetching corpus: 1398, signal 85982/126426 (executing program) 2021/05/10 11:15:04 fetching corpus: 1448, signal 87677/129082 (executing program) 2021/05/10 11:15:04 fetching corpus: 1498, signal 89101/131580 (executing program) 2021/05/10 11:15:04 fetching corpus: 1548, signal 90430/133957 (executing program) 2021/05/10 11:15:04 fetching corpus: 1596, signal 92041/136568 (executing program) 2021/05/10 11:15:04 fetching corpus: 1646, signal 93376/138973 (executing program) 2021/05/10 11:15:04 fetching corpus: 1696, signal 94287/140975 (executing program) 2021/05/10 11:15:04 fetching corpus: 1746, signal 96105/143670 (executing program) 2021/05/10 11:15:04 fetching corpus: 1796, signal 97493/145980 (executing program) 2021/05/10 11:15:04 fetching corpus: 1846, signal 98487/148035 (executing program) 2021/05/10 11:15:04 fetching corpus: 1896, signal 99275/149882 (executing program) 2021/05/10 11:15:04 fetching corpus: 1946, signal 100249/151866 (executing program) 2021/05/10 11:15:04 fetching corpus: 1995, signal 101075/153773 (executing program) 2021/05/10 11:15:04 fetching corpus: 2045, signal 102232/155833 (executing program) 2021/05/10 11:15:04 fetching corpus: 2095, signal 103109/157746 (executing program) 2021/05/10 11:15:04 fetching corpus: 2145, signal 104669/160097 (executing program) 2021/05/10 11:15:04 fetching corpus: 2195, signal 105441/161896 (executing program) 2021/05/10 11:15:04 fetching corpus: 2245, signal 106955/164198 (executing program) 2021/05/10 11:15:04 fetching corpus: 2295, signal 107737/165913 (executing program) 2021/05/10 11:15:04 fetching corpus: 2345, signal 108801/167830 (executing program) 2021/05/10 11:15:04 fetching corpus: 2395, signal 109665/169635 (executing program) 2021/05/10 11:15:05 fetching corpus: 2444, signal 110968/171698 (executing program) 2021/05/10 11:15:05 fetching corpus: 2494, signal 111623/173297 (executing program) 2021/05/10 11:15:05 fetching corpus: 2544, signal 112398/174988 (executing program) 2021/05/10 11:15:05 fetching corpus: 2594, signal 113469/176876 (executing program) 2021/05/10 11:15:05 fetching corpus: 2644, signal 114592/178744 (executing program) 2021/05/10 11:15:05 fetching corpus: 2694, signal 115845/180723 (executing program) 2021/05/10 11:15:05 fetching corpus: 2744, signal 117605/182980 (executing program) 2021/05/10 11:15:05 fetching corpus: 2794, signal 118253/184573 (executing program) 2021/05/10 11:15:05 fetching corpus: 2844, signal 118963/186182 (executing program) 2021/05/10 11:15:05 fetching corpus: 2894, signal 119550/187727 (executing program) 2021/05/10 11:15:05 fetching corpus: 2944, signal 120312/189350 (executing program) 2021/05/10 11:15:05 fetching corpus: 2994, signal 121350/191124 (executing program) 2021/05/10 11:15:05 fetching corpus: 3044, signal 122264/192798 (executing program) 2021/05/10 11:15:05 fetching corpus: 3094, signal 123395/194558 (executing program) 2021/05/10 11:15:05 fetching corpus: 3144, signal 124047/196076 (executing program) 2021/05/10 11:15:05 fetching corpus: 3194, signal 124616/197502 (executing program) 2021/05/10 11:15:05 fetching corpus: 3244, signal 125531/199083 (executing program) 2021/05/10 11:15:05 fetching corpus: 3294, signal 126494/200684 (executing program) 2021/05/10 11:15:05 fetching corpus: 3344, signal 126921/201976 (executing program) 2021/05/10 11:15:05 fetching corpus: 3394, signal 127457/203332 (executing program) 2021/05/10 11:15:05 fetching corpus: 3444, signal 128083/204771 (executing program) 2021/05/10 11:15:05 fetching corpus: 3494, signal 128501/206083 (executing program) 2021/05/10 11:15:05 fetching corpus: 3544, signal 129077/207453 (executing program) 2021/05/10 11:15:05 fetching corpus: 3594, signal 129843/208909 (executing program) 2021/05/10 11:15:05 fetching corpus: 3644, signal 130538/210337 (executing program) 2021/05/10 11:15:05 fetching corpus: 3694, signal 131675/212013 (executing program) 2021/05/10 11:15:05 fetching corpus: 3744, signal 132354/213390 (executing program) 2021/05/10 11:15:06 fetching corpus: 3794, signal 132932/214717 (executing program) 2021/05/10 11:15:06 fetching corpus: 3844, signal 133597/216096 (executing program) 2021/05/10 11:15:06 fetching corpus: 3894, signal 134137/217419 (executing program) 2021/05/10 11:15:06 fetching corpus: 3944, signal 134977/218776 (executing program) 2021/05/10 11:15:06 fetching corpus: 3994, signal 135367/220000 (executing program) 2021/05/10 11:15:06 fetching corpus: 4044, signal 136143/221403 (executing program) 2021/05/10 11:15:06 fetching corpus: 4094, signal 136848/222738 (executing program) 2021/05/10 11:15:06 fetching corpus: 4144, signal 137323/223989 (executing program) 2021/05/10 11:15:06 fetching corpus: 4194, signal 137923/225281 (executing program) 2021/05/10 11:15:06 fetching corpus: 4244, signal 138769/226607 (executing program) 2021/05/10 11:15:06 fetching corpus: 4294, signal 139318/227786 (executing program) 2021/05/10 11:15:06 fetching corpus: 4344, signal 139923/228988 (executing program) 2021/05/10 11:15:06 fetching corpus: 4394, signal 141011/230378 (executing program) 2021/05/10 11:15:06 fetching corpus: 4444, signal 141462/231510 (executing program) 2021/05/10 11:15:06 fetching corpus: 4494, signal 141976/232661 (executing program) 2021/05/10 11:15:06 fetching corpus: 4544, signal 142430/233786 (executing program) 2021/05/10 11:15:06 fetching corpus: 4594, signal 142944/234950 (executing program) 2021/05/10 11:15:06 fetching corpus: 4644, signal 143340/236040 (executing program) 2021/05/10 11:15:06 fetching corpus: 4694, signal 143808/237162 (executing program) 2021/05/10 11:15:06 fetching corpus: 4744, signal 144386/238376 (executing program) 2021/05/10 11:15:06 fetching corpus: 4794, signal 145066/239574 (executing program) 2021/05/10 11:15:06 fetching corpus: 4844, signal 145497/240684 (executing program) 2021/05/10 11:15:06 fetching corpus: 4894, signal 145890/241797 (executing program) 2021/05/10 11:15:06 fetching corpus: 4944, signal 146521/242952 (executing program) 2021/05/10 11:15:06 fetching corpus: 4994, signal 146929/244020 (executing program) 2021/05/10 11:15:06 fetching corpus: 5044, signal 147471/245125 (executing program) 2021/05/10 11:15:06 fetching corpus: 5094, signal 148097/246262 (executing program) 2021/05/10 11:15:06 fetching corpus: 5144, signal 149137/247477 (executing program) 2021/05/10 11:15:06 fetching corpus: 5194, signal 149580/248532 (executing program) 2021/05/10 11:15:07 fetching corpus: 5244, signal 150306/249647 (executing program) 2021/05/10 11:15:07 fetching corpus: 5294, signal 150745/250699 (executing program) 2021/05/10 11:15:07 fetching corpus: 5344, signal 151293/251721 (executing program) 2021/05/10 11:15:07 fetching corpus: 5394, signal 151724/252748 (executing program) 2021/05/10 11:15:07 fetching corpus: 5444, signal 153084/253990 (executing program) 2021/05/10 11:15:07 fetching corpus: 5494, signal 153656/255028 (executing program) 2021/05/10 11:15:07 fetching corpus: 5544, signal 154183/256035 (executing program) 2021/05/10 11:15:07 fetching corpus: 5594, signal 154684/257044 (executing program) 2021/05/10 11:15:07 fetching corpus: 5644, signal 155141/257982 (executing program) 2021/05/10 11:15:07 fetching corpus: 5693, signal 155579/258962 (executing program) 2021/05/10 11:15:07 fetching corpus: 5743, signal 156402/260106 (executing program) 2021/05/10 11:15:07 fetching corpus: 5793, signal 156804/261094 (executing program) 2021/05/10 11:15:07 fetching corpus: 5843, signal 157305/262058 (executing program) 2021/05/10 11:15:07 fetching corpus: 5893, signal 157607/263006 (executing program) 2021/05/10 11:15:07 fetching corpus: 5943, signal 157944/263893 (executing program) 2021/05/10 11:15:07 fetching corpus: 5993, signal 158523/264860 (executing program) 2021/05/10 11:15:07 fetching corpus: 6043, signal 159035/265762 (executing program) 2021/05/10 11:15:07 fetching corpus: 6093, signal 159462/266675 (executing program) 2021/05/10 11:15:07 fetching corpus: 6143, signal 159911/267604 (executing program) 2021/05/10 11:15:07 fetching corpus: 6193, signal 160324/268492 (executing program) 2021/05/10 11:15:07 fetching corpus: 6243, signal 160780/269425 (executing program) 2021/05/10 11:15:07 fetching corpus: 6293, signal 161338/270391 (executing program) 2021/05/10 11:15:07 fetching corpus: 6343, signal 161905/271291 (executing program) 2021/05/10 11:15:07 fetching corpus: 6393, signal 162371/272235 (executing program) 2021/05/10 11:15:07 fetching corpus: 6443, signal 162858/273085 (executing program) 2021/05/10 11:15:07 fetching corpus: 6493, signal 163308/273975 (executing program) 2021/05/10 11:15:07 fetching corpus: 6543, signal 163976/274892 (executing program) 2021/05/10 11:15:07 fetching corpus: 6593, signal 164561/275755 (executing program) 2021/05/10 11:15:07 fetching corpus: 6643, signal 164977/276613 (executing program) 2021/05/10 11:15:07 fetching corpus: 6693, signal 165528/277455 (executing program) 2021/05/10 11:15:07 fetching corpus: 6743, signal 165925/278325 (executing program) 2021/05/10 11:15:08 fetching corpus: 6793, signal 166374/279183 (executing program) 2021/05/10 11:15:08 fetching corpus: 6843, signal 166835/279989 (executing program) 2021/05/10 11:15:08 fetching corpus: 6893, signal 167165/280776 (executing program) 2021/05/10 11:15:08 fetching corpus: 6943, signal 167529/281564 (executing program) 2021/05/10 11:15:08 fetching corpus: 6993, signal 167820/282385 (executing program) 2021/05/10 11:15:08 fetching corpus: 7043, signal 168335/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7093, signal 168659/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7143, signal 168938/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7193, signal 169917/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7243, signal 170372/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7293, signal 170809/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7343, signal 171155/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7393, signal 171629/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7443, signal 171900/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7493, signal 172218/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7543, signal 172532/282521 (executing program) 2021/05/10 11:15:08 fetching corpus: 7593, signal 172998/282528 (executing program) 2021/05/10 11:15:08 fetching corpus: 7643, signal 173438/282528 (executing program) 2021/05/10 11:15:08 fetching corpus: 7693, signal 173890/282528 (executing program) 2021/05/10 11:15:08 fetching corpus: 7743, signal 174258/282528 (executing program) 2021/05/10 11:15:08 fetching corpus: 7793, signal 174469/282528 (executing program) 2021/05/10 11:15:08 fetching corpus: 7843, signal 174869/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 7893, signal 175260/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 7943, signal 175761/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 7993, signal 176174/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 8043, signal 176606/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 8093, signal 176850/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 8143, signal 177146/282529 (executing program) 2021/05/10 11:15:08 fetching corpus: 8193, signal 177771/282532 (executing program) 2021/05/10 11:15:08 fetching corpus: 8243, signal 178324/282532 (executing program) 2021/05/10 11:15:08 fetching corpus: 8293, signal 178708/282532 (executing program) 2021/05/10 11:15:08 fetching corpus: 8343, signal 178996/282532 (executing program) 2021/05/10 11:15:08 fetching corpus: 8393, signal 179491/282532 (executing program) 2021/05/10 11:15:09 fetching corpus: 8443, signal 180006/282532 (executing program) 2021/05/10 11:15:09 fetching corpus: 8493, signal 180436/282532 (executing program) 2021/05/10 11:15:09 fetching corpus: 8543, signal 180942/282532 (executing program) 2021/05/10 11:15:09 fetching corpus: 8593, signal 181386/282532 (executing program) 2021/05/10 11:15:09 fetching corpus: 8643, signal 181685/282533 (executing program) 2021/05/10 11:15:09 fetching corpus: 8693, signal 182064/282533 (executing program) 2021/05/10 11:15:09 fetching corpus: 8743, signal 182421/282533 (executing program) 2021/05/10 11:15:09 fetching corpus: 8793, signal 182642/282533 (executing program) 2021/05/10 11:15:09 fetching corpus: 8843, signal 183210/282537 (executing program) 2021/05/10 11:15:09 fetching corpus: 8893, signal 183608/282537 (executing program) 2021/05/10 11:15:09 fetching corpus: 8943, signal 184142/282537 (executing program) 2021/05/10 11:15:09 fetching corpus: 8993, signal 184530/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9043, signal 184905/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9093, signal 185292/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9143, signal 185715/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9191, signal 186056/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9241, signal 186342/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9291, signal 186680/282539 (executing program) 2021/05/10 11:15:09 fetching corpus: 9341, signal 187039/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9391, signal 187458/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9441, signal 187850/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9491, signal 188110/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9541, signal 188367/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9591, signal 188613/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9641, signal 188975/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9691, signal 189413/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9741, signal 189760/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9791, signal 190167/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9841, signal 190488/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9891, signal 190864/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9941, signal 191200/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 9991, signal 191805/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 10041, signal 191991/282540 (executing program) 2021/05/10 11:15:09 fetching corpus: 10091, signal 192293/282541 (executing program) 2021/05/10 11:15:09 fetching corpus: 10141, signal 192621/282541 (executing program) 2021/05/10 11:15:10 fetching corpus: 10191, signal 192872/282541 (executing program) 2021/05/10 11:15:10 fetching corpus: 10241, signal 193256/282541 (executing program) 2021/05/10 11:15:10 fetching corpus: 10291, signal 193571/282541 (executing program) 2021/05/10 11:15:10 fetching corpus: 10341, signal 193865/282545 (executing program) 2021/05/10 11:15:10 fetching corpus: 10391, signal 194227/282545 (executing program) 2021/05/10 11:15:10 fetching corpus: 10441, signal 194570/282545 (executing program) 2021/05/10 11:15:10 fetching corpus: 10491, signal 194832/282545 (executing program) 2021/05/10 11:15:10 fetching corpus: 10541, signal 194999/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10591, signal 195258/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10641, signal 195613/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10691, signal 196030/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10741, signal 196371/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10791, signal 196577/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10841, signal 197004/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10891, signal 197173/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10941, signal 197493/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 10991, signal 197796/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 11041, signal 198174/282561 (executing program) 2021/05/10 11:15:10 fetching corpus: 11091, signal 198559/282572 (executing program) 2021/05/10 11:15:10 fetching corpus: 11141, signal 198774/282572 (executing program) 2021/05/10 11:15:10 fetching corpus: 11191, signal 198938/282572 (executing program) 2021/05/10 11:15:10 fetching corpus: 11240, signal 199156/282572 (executing program) 2021/05/10 11:15:10 fetching corpus: 11290, signal 199463/282572 (executing program) 2021/05/10 11:15:10 fetching corpus: 11339, signal 199826/282573 (executing program) 2021/05/10 11:15:10 fetching corpus: 11389, signal 200049/282573 (executing program) 2021/05/10 11:15:10 fetching corpus: 11439, signal 200413/282573 (executing program) 2021/05/10 11:15:10 fetching corpus: 11489, signal 200845/282573 (executing program) 2021/05/10 11:15:10 fetching corpus: 11539, signal 201048/282575 (executing program) 2021/05/10 11:15:10 fetching corpus: 11589, signal 201397/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11638, signal 201623/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11688, signal 201876/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11738, signal 202096/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11788, signal 202405/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11838, signal 202820/282576 (executing program) 2021/05/10 11:15:10 fetching corpus: 11888, signal 203015/282577 (executing program) 2021/05/10 11:15:10 fetching corpus: 11938, signal 203199/282577 (executing program) 2021/05/10 11:15:11 fetching corpus: 11988, signal 203455/282577 (executing program) 2021/05/10 11:15:11 fetching corpus: 12038, signal 203783/282577 (executing program) 2021/05/10 11:15:11 fetching corpus: 12088, signal 204067/282577 (executing program) 2021/05/10 11:15:11 fetching corpus: 12138, signal 204345/282577 (executing program) 2021/05/10 11:15:11 fetching corpus: 12188, signal 204581/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12238, signal 204861/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12288, signal 205097/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12338, signal 205431/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12387, signal 205616/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12437, signal 205867/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12487, signal 206104/282578 (executing program) 2021/05/10 11:15:11 fetching corpus: 12537, signal 206386/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12587, signal 206596/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12636, signal 206793/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12686, signal 206978/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12736, signal 207235/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12786, signal 207563/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12836, signal 207977/282581 (executing program) 2021/05/10 11:15:11 fetching corpus: 12886, signal 208341/282587 (executing program) 2021/05/10 11:15:11 fetching corpus: 12936, signal 208928/282587 (executing program) 2021/05/10 11:15:11 fetching corpus: 12986, signal 209159/282587 (executing program) 2021/05/10 11:15:11 fetching corpus: 13036, signal 209515/282587 (executing program) 2021/05/10 11:15:11 fetching corpus: 13086, signal 209988/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13136, signal 210172/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13186, signal 210440/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13235, signal 210765/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13285, signal 211055/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13335, signal 211303/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13385, signal 211679/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13435, signal 211956/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13485, signal 212214/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13534, signal 212454/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13584, signal 212787/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13634, signal 212998/282588 (executing program) 2021/05/10 11:15:11 fetching corpus: 13684, signal 213318/282588 (executing program) 2021/05/10 11:15:12 fetching corpus: 13734, signal 213663/282588 (executing program) 2021/05/10 11:15:12 fetching corpus: 13784, signal 213889/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 13834, signal 214153/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 13884, signal 214432/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 13934, signal 214667/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 13984, signal 214897/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 14034, signal 215115/282594 (executing program) 2021/05/10 11:15:12 fetching corpus: 14084, signal 215339/282596 (executing program) 2021/05/10 11:15:12 fetching corpus: 14134, signal 215512/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14184, signal 215736/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14234, signal 215988/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14284, signal 216193/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14334, signal 216376/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14384, signal 216633/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14434, signal 216837/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14484, signal 217040/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14534, signal 217244/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14584, signal 217469/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14634, signal 217717/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14684, signal 217990/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14734, signal 218246/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14784, signal 218470/282599 (executing program) 2021/05/10 11:15:12 fetching corpus: 14834, signal 218698/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 14884, signal 218924/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 14934, signal 219107/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 14984, signal 219327/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15034, signal 219494/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15084, signal 219743/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15134, signal 219978/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15184, signal 220136/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15234, signal 220574/282602 (executing program) 2021/05/10 11:15:12 fetching corpus: 15284, signal 220783/282602 (executing program) 2021/05/10 11:15:13 fetching corpus: 15334, signal 221005/282602 (executing program) 2021/05/10 11:15:13 fetching corpus: 15383, signal 221233/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15433, signal 221430/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15483, signal 221604/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15533, signal 221821/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15583, signal 222001/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15633, signal 222248/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15683, signal 222508/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15733, signal 222704/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15783, signal 222956/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15833, signal 223177/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15883, signal 223356/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15932, signal 223519/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 15982, signal 223880/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16032, signal 224051/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16082, signal 224277/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16132, signal 224489/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16182, signal 224752/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16232, signal 224919/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16282, signal 225108/282610 (executing program) 2021/05/10 11:15:13 fetching corpus: 16332, signal 225250/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16382, signal 225448/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16431, signal 225636/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16481, signal 225856/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16531, signal 226070/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16581, signal 226295/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16631, signal 226487/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16680, signal 226893/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16730, signal 227060/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16780, signal 227427/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16830, signal 227660/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16880, signal 227847/282616 (executing program) 2021/05/10 11:15:13 fetching corpus: 16930, signal 228069/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 16980, signal 228289/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17030, signal 228477/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17080, signal 228679/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17130, signal 228909/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17180, signal 229184/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17230, signal 229375/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17280, signal 229590/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17330, signal 229792/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17379, signal 229943/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17429, signal 230216/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17479, signal 230455/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17528, signal 230608/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17578, signal 230902/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17628, signal 231147/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17678, signal 231463/282616 (executing program) 2021/05/10 11:15:14 fetching corpus: 17728, signal 231672/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 17778, signal 231998/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 17828, signal 232202/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 17878, signal 232487/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 17928, signal 232759/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 17978, signal 233101/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18028, signal 233365/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18078, signal 233527/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18128, signal 233739/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18178, signal 233881/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18228, signal 234070/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18278, signal 234595/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18328, signal 234767/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18378, signal 235228/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18428, signal 235471/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18478, signal 235679/282621 (executing program) 2021/05/10 11:15:14 fetching corpus: 18527, signal 235902/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18577, signal 236312/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18627, signal 236567/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18677, signal 236872/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18727, signal 237172/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18777, signal 237337/282621 (executing program) 2021/05/10 11:15:15 fetching corpus: 18827, signal 237522/282623 (executing program) 2021/05/10 11:15:15 fetching corpus: 18877, signal 237664/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 18927, signal 237826/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 18977, signal 238190/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19027, signal 238352/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19077, signal 238602/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19127, signal 238765/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19177, signal 238937/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19227, signal 239087/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19277, signal 239276/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19327, signal 239485/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19377, signal 239656/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19427, signal 239941/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19477, signal 240138/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19526, signal 240349/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19576, signal 240530/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19626, signal 240750/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19675, signal 240915/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19725, signal 241148/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19775, signal 241319/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19825, signal 241554/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19875, signal 241805/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19925, signal 241995/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 19975, signal 242276/282657 (executing program) 2021/05/10 11:15:15 fetching corpus: 20024, signal 242520/282659 (executing program) 2021/05/10 11:15:15 fetching corpus: 20074, signal 242682/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20123, signal 243168/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20173, signal 243513/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20223, signal 243685/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20273, signal 243862/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20323, signal 244064/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20373, signal 244217/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20423, signal 244426/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20473, signal 244586/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20523, signal 244790/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20573, signal 245070/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20623, signal 245305/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20673, signal 245524/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20723, signal 246096/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20773, signal 246288/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20823, signal 246524/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20873, signal 246838/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20923, signal 247031/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 20973, signal 247168/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21023, signal 247371/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21073, signal 247506/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21123, signal 247708/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21173, signal 247862/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21223, signal 248099/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21273, signal 248281/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21322, signal 248455/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21372, signal 248642/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21421, signal 248819/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21471, signal 249029/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21520, signal 249353/282659 (executing program) 2021/05/10 11:15:16 fetching corpus: 21570, signal 249553/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21620, signal 249812/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21670, signal 250017/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21720, signal 250129/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21770, signal 250282/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21820, signal 250441/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21870, signal 250628/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21919, signal 250809/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 21969, signal 250953/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 22019, signal 251167/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 22069, signal 251352/282659 (executing program) 2021/05/10 11:15:17 fetching corpus: 22119, signal 251451/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22169, signal 251603/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22219, signal 251747/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22269, signal 251985/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22319, signal 252182/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22369, signal 252335/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22418, signal 252502/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22468, signal 252661/282666 (executing program) 2021/05/10 11:15:17 fetching corpus: 22518, signal 252804/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22568, signal 252980/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22618, signal 253196/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22668, signal 253414/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22718, signal 253573/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22768, signal 253737/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22818, signal 253954/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22868, signal 254147/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22918, signal 254360/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 22968, signal 254579/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 23018, signal 254738/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 23068, signal 254958/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 23118, signal 255086/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 23168, signal 255328/282669 (executing program) 2021/05/10 11:15:17 fetching corpus: 23218, signal 255466/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23268, signal 255625/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23318, signal 255778/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23368, signal 256013/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23418, signal 256227/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23468, signal 256427/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23518, signal 256658/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23568, signal 256815/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23618, signal 257007/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23668, signal 257204/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23718, signal 257379/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23768, signal 257556/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23818, signal 257711/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23868, signal 257835/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23918, signal 257993/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 23968, signal 258218/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 24018, signal 258427/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 24068, signal 258597/282669 (executing program) 2021/05/10 11:15:18 fetching corpus: 24118, signal 258758/282673 (executing program) 2021/05/10 11:15:18 fetching corpus: 24168, signal 258921/282673 (executing program) 2021/05/10 11:15:18 fetching corpus: 24218, signal 259079/282673 (executing program) 2021/05/10 11:15:18 fetching corpus: 24268, signal 259206/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24318, signal 259338/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24368, signal 259592/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24418, signal 259744/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24468, signal 259916/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24518, signal 260057/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24568, signal 260239/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24617, signal 260414/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24667, signal 260567/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24717, signal 260792/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24767, signal 260982/282674 (executing program) 2021/05/10 11:15:18 fetching corpus: 24816, signal 261107/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 24866, signal 261271/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 24916, signal 261430/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 24966, signal 261621/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 25016, signal 261739/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 25066, signal 261947/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 25116, signal 262093/282674 (executing program) 2021/05/10 11:15:19 fetching corpus: 25166, signal 262239/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25216, signal 262364/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25266, signal 262548/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25316, signal 262977/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25366, signal 263122/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25416, signal 263264/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25466, signal 263498/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25516, signal 263716/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25566, signal 263896/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25616, signal 264086/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25666, signal 264243/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25716, signal 264458/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25766, signal 264610/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25816, signal 264791/282682 (executing program) 2021/05/10 11:15:19 fetching corpus: 25865, signal 264901/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 25915, signal 265105/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 25964, signal 265353/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26014, signal 265477/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26064, signal 265624/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26114, signal 265758/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26163, signal 265935/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26213, signal 266186/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26263, signal 266304/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26313, signal 266425/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26363, signal 266528/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26413, signal 266670/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26463, signal 266897/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26513, signal 267072/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26563, signal 267269/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26613, signal 267400/282683 (executing program) 2021/05/10 11:15:19 fetching corpus: 26663, signal 267530/282683 (executing program) 2021/05/10 11:15:20 fetching corpus: 26712, signal 267664/282683 (executing program) 2021/05/10 11:15:20 fetching corpus: 26760, signal 267893/282909 (executing program) 2021/05/10 11:15:20 fetching corpus: 26809, signal 268095/282909 (executing program) 2021/05/10 11:15:20 fetching corpus: 26859, signal 268263/282911 (executing program) 2021/05/10 11:15:20 fetching corpus: 26909, signal 268419/282911 (executing program) 2021/05/10 11:15:20 fetching corpus: 26959, signal 268650/282911 (executing program) 2021/05/10 11:15:20 fetching corpus: 27009, signal 268824/282911 (executing program) 2021/05/10 11:15:20 fetching corpus: 27059, signal 268993/282913 (executing program) 2021/05/10 11:15:20 fetching corpus: 27108, signal 269109/282913 (executing program) 2021/05/10 11:15:20 fetching corpus: 27158, signal 269342/282913 (executing program) 2021/05/10 11:15:20 fetching corpus: 27208, signal 269466/282913 (executing program) 2021/05/10 11:15:20 fetching corpus: 27258, signal 269641/282913 (executing program) 2021/05/10 11:15:20 fetching corpus: 27308, signal 269838/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27358, signal 270026/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27408, signal 270185/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27458, signal 270319/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27508, signal 270454/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27558, signal 270607/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27608, signal 270761/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27657, signal 270899/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27707, signal 270999/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27756, signal 271092/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27806, signal 271255/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27855, signal 271421/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27904, signal 271559/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 27954, signal 271723/282914 (executing program) 2021/05/10 11:15:20 fetching corpus: 28003, signal 271902/282918 (executing program) 2021/05/10 11:15:20 fetching corpus: 28053, signal 272059/282918 (executing program) 2021/05/10 11:15:20 fetching corpus: 28103, signal 272230/282918 (executing program) 2021/05/10 11:15:20 fetching corpus: 28153, signal 272404/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28202, signal 272549/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28252, signal 272668/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28302, signal 272823/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28352, signal 272924/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28402, signal 273110/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28451, signal 273244/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28501, signal 273377/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28551, signal 273553/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28601, signal 273682/282918 (executing program) 2021/05/10 11:15:21 fetching corpus: 28651, signal 273821/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28701, signal 273977/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28751, signal 274121/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28801, signal 274297/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28851, signal 274470/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28900, signal 274608/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 28950, signal 274717/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29000, signal 274846/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29050, signal 274991/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29099, signal 275073/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29149, signal 275187/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29199, signal 275317/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29249, signal 275424/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29299, signal 275594/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29349, signal 275725/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29399, signal 275882/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29449, signal 276029/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29499, signal 276154/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29549, signal 276275/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29599, signal 276404/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29649, signal 276600/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29699, signal 276717/282920 (executing program) 2021/05/10 11:15:21 fetching corpus: 29749, signal 276828/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 29799, signal 276939/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 29849, signal 277067/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 29899, signal 277265/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 29949, signal 277401/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 29999, signal 277531/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30049, signal 277707/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30099, signal 277824/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30149, signal 277943/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30199, signal 278111/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30249, signal 278228/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30299, signal 278370/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30349, signal 278483/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30399, signal 278659/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30449, signal 278826/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30499, signal 278971/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30549, signal 279127/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30598, signal 279269/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30648, signal 279414/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30698, signal 279570/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30748, signal 279752/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30798, signal 279907/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30848, signal 280010/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30898, signal 280143/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30948, signal 280263/282920 (executing program) 2021/05/10 11:15:22 fetching corpus: 30998, signal 280426/282927 (executing program) 2021/05/10 11:15:22 fetching corpus: 31048, signal 280594/282927 (executing program) 2021/05/10 11:15:22 fetching corpus: 31098, signal 280770/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31148, signal 280957/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31198, signal 281057/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31248, signal 281179/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31298, signal 281379/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31348, signal 281499/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31380, signal 281582/282931 (executing program) 2021/05/10 11:15:22 fetching corpus: 31380, signal 281582/282931 (executing program) 2021/05/10 11:15:24 starting 6 fuzzer processes 11:15:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_delete(0x0) 11:15:24 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x4) 11:15:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) 11:15:24 executing program 0: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) set_mempolicy(0x3, &(0x7f0000000180)=0xfffffffffffffff9, 0x40) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:15:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x1, 0x0, 0x0) read(r0, &(0x7f0000000880)=""/4096, 0x1000) 11:15:24 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) syzkaller login: [ 39.801771][ T25] audit: type=1400 audit(1620645324.623:8): avc: denied { execmem } for pid=1764 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 39.937166][ T1770] cgroup: Unknown subsys name 'perf_event' [ 39.944702][ T1771] cgroup: Unknown subsys name 'perf_event' [ 39.952106][ T1772] cgroup: Unknown subsys name 'perf_event' [ 39.955957][ T1770] cgroup: Unknown subsys name 'net_cls' [ 39.960850][ T1771] cgroup: Unknown subsys name 'net_cls' [ 39.964732][ T1774] cgroup: Unknown subsys name 'perf_event' [ 39.969401][ T1772] cgroup: Unknown subsys name 'net_cls' [ 39.980362][ T1773] cgroup: Unknown subsys name 'perf_event' [ 39.986872][ T1773] cgroup: Unknown subsys name 'net_cls' [ 39.988511][ T1774] cgroup: Unknown subsys name 'net_cls' [ 39.993607][ T1778] cgroup: Unknown subsys name 'perf_event' [ 40.004204][ T1778] cgroup: Unknown subsys name 'net_cls' 11:15:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x4000800, 0x0, 0x0) 11:15:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14d, &(0x7f00000001c0)="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"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 11:15:29 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 11:15:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x540b, 0x1) [ 44.612239][ T4507] new mount options do not match the existing superblock, will be ignored 11:15:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c8ca91e9c568377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2f5903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd4089a8e9c296f", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 11:15:29 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 11:15:29 executing program 2: sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c}, 0x1c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x8910, &(0x7f00000000c0)={0x0, @in={0x2, 0x0, @multicast2}, @xdp, @hci}) 11:15:29 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f00009d6000/0x2000)=nil) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x201608, 0x0, 0x0, 0x0) [ 44.654147][ T4507] new mount options do not match the existing superblock, will be ignored [ 44.748777][ T4548] mmap: syz-executor.0 (4548) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 11:15:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) 11:15:29 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="fc00000018000700ab092500090007000a060000000000060000369321000100ff0100000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) 11:15:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r2, 0x6, 0x10, &(0x7f0000937fed)=""/1, &(0x7f0000000080)=0x1) 11:15:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c8ca91e9c568377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2f5903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd4089a8e9c296f", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 11:15:29 executing program 0: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 44.910759][ T4575] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 44.918213][ T4575] IPv6: NLM_F_CREATE should be set when creating new route [ 44.925515][ T4575] IPv6: NLM_F_CREATE should be set when creating new route 11:15:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002", 0x39, 0x4200}], 0x0, &(0x7f0000014d00)) 11:15:32 executing program 0: futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000080), 0x1f000000) 11:15:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 11:15:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in=@empty}}, 0xe4) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:15:32 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) 11:15:32 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) 11:15:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) [ 47.601524][ T4590] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 47.615656][ T4596] loop2: detected capacity change from 0 to 264192 11:15:32 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x10001, &(0x7f0000000080)=ANY=[]) chown(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 11:15:32 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x42000, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(r1, r0, 0x0) [ 47.663418][ T4596] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 47.681606][ T4596] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 47.692391][ T4596] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 11:15:32 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) [ 47.722755][ T4611] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 47.755238][ T4615] loop0: detected capacity change from 0 to 87 [ 47.767632][ T4596] EXT4-fs (loop2): mount failed [ 47.775569][ T4622] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 11:15:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c8ca91e9c568377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2f5903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd4089a8e9c296f", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 11:15:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c00000068001142fe080853b270240002000000", @ANYRES32=r1, @ANYBLOB="04000b"], 0x1c}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10008, 0x0) 11:15:32 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000002580)='w', 0xffffffef, 0x10001) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0xffffffffffffffff) 11:15:32 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x60c03, 0x0) 11:15:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002", 0x39, 0x4200}], 0x0, &(0x7f0000014d00)) 11:15:32 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) 11:15:32 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 47.934093][ T4648] loop2: detected capacity change from 0 to 264192 [ 47.951105][ T4648] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 47.969568][ T4648] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 11:15:32 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) [ 47.980131][ T4648] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 47.993357][ T4658] loop1: detected capacity change from 0 to 240 [ 48.053997][ T4648] EXT4-fs (loop2): mount failed 11:15:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002", 0x39, 0x4200}], 0x0, &(0x7f0000014d00)) 11:15:33 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 11:15:33 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) writev(r1, &(0x7f0000001580)=[{&(0x7f0000000180)="e5", 0x1}], 0x1) ftruncate(r0, 0x6) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0xc, r1}) [ 48.136690][ T4674] loop1: detected capacity change from 0 to 240 [ 48.177587][ T4679] loop2: detected capacity change from 0 to 264192 [ 48.200153][ T4679] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 11:15:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r3, &(0x7f0000000000)={0x84e14c5c2813c056}) [ 48.218594][ T4679] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 48.229385][ T4679] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 48.243904][ T4679] EXT4-fs (loop2): mount failed [ 48.263574][ T4690] loop1: detected capacity change from 0 to 240 [ 48.295530][ T25] audit: type=1400 audit(1620645333.124:9): avc: denied { block_suspend } for pid=4695 comm="syz-executor.3" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 11:15:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c8ca91e9c568377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2f5903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd4089a8e9c296f", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 11:15:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002", 0x39, 0x4200}], 0x0, &(0x7f0000014d00)) 11:15:35 executing program 3: socket(0x10, 0x0, 0x0) 11:15:35 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) 11:15:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005d40)={0x0, 0x0, &(0x7f0000005b00)=[{&(0x7f0000002140)={0x1c, 0x32, 0x301, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, @generic=':']}, 0x1c}], 0x1}, 0x0) 11:15:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x38, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 11:15:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') pread64(r1, &(0x7f0000000280)=""/188, 0xbc, 0x0) [ 50.945597][ T4722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 50.952149][ T4721] loop1: detected capacity change from 0 to 240 [ 50.954862][ T4722] tc_dump_action: action bad kind 11:15:35 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2275, &(0x7f0000001700)) 11:15:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, 0xfffffffffffffffc, 0x0) 11:15:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000003c0)={0x0, 0x0, 0x0}) [ 50.992003][ T4729] loop2: detected capacity change from 0 to 264192 11:15:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x20}}, 0x0) 11:15:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') pread64(r1, &(0x7f0000000280)=""/188, 0xbc, 0x0) [ 51.043697][ T4729] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 51.062053][ T4729] EXT4-fs error (device loop2): ext4_quota_enable:6432: comm syz-executor.2: Bad quota inode # 3 [ 51.072616][ T4729] EXT4-fs warning (device loop2): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 51.087185][ T4729] EXT4-fs (loop2): mount failed 11:15:36 executing program 3: r0 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r0, 0x0}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 11:15:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') pread64(r1, &(0x7f0000000280)=""/188, 0xbc, 0x0) 11:15:38 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 11:15:38 executing program 1: mknod(&(0x7f0000000300)='./file0\x00', 0x1040, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) acct(&(0x7f00000000c0)='./file0\x00') acct(&(0x7f0000000040)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) unlink(&(0x7f0000000140)='./file0\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 11:15:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x1267, &(0x7f0000000000)) 11:15:38 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x32}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 11:15:38 executing program 5: r0 = socket(0x1, 0x2, 0x0) bind(r0, 0x0, 0x2) 11:15:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') pread64(r1, &(0x7f0000000280)=""/188, 0xbc, 0x0) 11:15:38 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x11) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRESHEX, @ANYRESHEX], 0x1a) write$binfmt_aout(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x4c2) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc177b8acdc0cd7ab2f5095463b2d81c069bbedff5d5e10ac280dc6616394b40fdfe09d122b6a5397b545ca16a966d2ed4f48137e2b69049a1e6cd5f33f859b1714be020ae4cac84db240b5e10d29372a7aa8e68a4fa064f99cc7bb33e342f4643acea7fafb9ea9b88f9d8a28356d26e00cc5f8a12", 0x95}], 0x1, 0x81805, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001140)=ANY=[@ANYRES16, @ANYRES32], 0x5e4}, 0x1, 0x0, 0x0, 0x8041}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24002da8) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0xa0, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "4145b45c185c86fa7971e39e30c0c5e92439fffd02ec21f82c5190"}}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "9d75bc666bd25df7915cc8947013aef0e4f8ab15e1"}}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40800}, 0xc000) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0xfffffffd, 0x0, 0x1b, 0x0, "0c7f70a167f6cc188cb61c00e740c14c32a9ab322fb8b57bba37c4d876ef58517c2cdde4c2a04a84ecfa7964b4f2f052f4a01d6fb697e016813b74913884da38", "941acb4e4d0917915e09309677f412287b88d52644d882c500", [0x8000]}) ioctl$LOOP_CLR_FD(r1, 0x4c01) 11:15:38 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000500), 0x0, 0x70b0c1) io_setup(0xfff, &(0x7f0000000000)=0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/clients\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000002880)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 11:15:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x0, 0x4, &(0x7f00000001c0)="ad04", 0x2) 11:15:38 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 11:15:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d0014e3f0500bb9fb045f2d1c190926c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8dcbf11169c111c145129d6f9f6c1f3b18d6d352507f7018b311fef2c560001000010000000fb8019128e7e4d939955f8ac296203784000400f573fbf0000fdffffffffeb95128ce7ec03ff07a380543b320be1c1bb99bb063fb60927e83569656a0bda31b0040015f033270100008cfcd61dc4", 0xbb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 11:15:38 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 11:15:38 executing program 0: r0 = gettid() getpriority(0x0, r0) [ 54.048374][ T4802] loop7: detected capacity change from 0 to 1036 [ 54.065515][ C1] hrtimer: interrupt took 27348 ns [ 54.085863][ T4783] Process accounting resumed [ 54.093175][ T4798] Process accounting resumed 11:15:38 executing program 1: r0 = syz_io_uring_setup(0x8ec, &(0x7f0000000240)={0x0, 0x0, 0x1}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ee8000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setresuid(0x0, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 11:15:38 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 11:15:38 executing program 0: set_mempolicy(0x3, &(0x7f00000000c0)=0x10001, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={0x14, r1, 0x305}, 0x14}}, 0x0) 11:15:39 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0xffffe000, 0x0, 0x8eb31, 0xffffffffffffffff, 0x0) 11:15:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x5}, {0x15, 0x0, 0x0, 0x7}, {0x6, 0x0, 0x0, 0x7ffffdc0}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 54.099059][ T4815] Process accounting resumed [ 54.134609][ T4815] Process accounting resumed 11:15:39 executing program 5: capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) prctl$PR_GET_IO_FLUSHER(0x23) 11:15:39 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="040800090000ff01e66174000404090a0e01027400f8", 0x16}, {&(0x7f0000000140)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000180)) 11:15:39 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x33}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 11:15:39 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000001c0)=[{0x0, 0x3, 0x0, 0x0, @time={0x0, 0x1f}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x2f3}) 11:15:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5608, 0x0) 11:15:39 executing program 2: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) [ 54.240673][ T4828] loop7: detected capacity change from 0 to 1036 [ 54.276143][ T4849] loop_set_status: loop7 () has still dirty pages (nrpages=2) 11:15:39 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x68, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:bsdpty_device_t:s0\x00'}]}, 0x68}}, 0x0) 11:15:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/diskstats\x00', 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:15:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a005f0214f9f424000904000a", 0xfffffffffffffc70) splice(r1, 0x0, r2, 0x0, 0xfffd, 0x0) 11:15:39 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={[0x9]}, 0x8}) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa7000be0) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) [ 54.307944][ T4863] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 54.334377][ T4865] loop3: detected capacity change from 0 to 264192 11:15:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/diskstats\x00', 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:15:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = dup2(r1, r1) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r3, 0x1, 0x4, @local}, 0x10) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @random="b0dabb74acb7"}, 0x10) [ 54.354606][ T4865] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 54.364164][ T4865] FAT-fs (loop3): bogus number of directory entries (513) [ 54.371603][ T4865] FAT-fs (loop3): Can't find a valid FAT filesystem 11:15:39 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffffe, 0x0) 11:15:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) [ 54.470421][ T4899] device lo entered promiscuous mode [ 54.492448][ T4896] device lo left promiscuous mode [ 54.508171][ T4907] device lo entered promiscuous mode [ 54.515905][ T4896] device lo left promiscuous mode 11:15:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="000000b639033a", 0x7}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912f", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 11:15:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b", 0x55, 0x400}], 0x0, &(0x7f0000000580)) 11:15:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/diskstats\x00', 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:15:40 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000004}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0xa99214a4}) 11:15:40 executing program 5: set_mempolicy(0x4001, 0x0, 0x0) 11:15:40 executing program 1: r0 = io_uring_setup(0x4998, &(0x7f00000000c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x200002) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[r1, r2], 0x2) 11:15:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/diskstats\x00', 0x0, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:15:40 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x346a, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 11:15:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x0, 0x2, 0x1}, 0x20) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@private2}, 0x20) 11:15:40 executing program 1: sync() [ 55.208637][ T4928] loop2: detected capacity change from 0 to 4 [ 55.218431][ T4928] EXT4-fs (loop2): unsupported inode size: 0 [ 55.224741][ T4928] EXT4-fs (loop2): blocksize: 1024 11:15:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000e, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x48) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="23218b8c4a621fc7f2d18c50aad68009"], 0x191) close(r2) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 11:15:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)={0x24, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x10, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @typed={0x4, 0x36, 0x0, 0x0, @binary}]}, 0x24}], 0x1}, 0x0) [ 55.275544][ T4954] loop2: detected capacity change from 0 to 4 [ 55.283991][ T4954] EXT4-fs (loop2): unsupported inode size: 0 [ 55.290339][ T4954] EXT4-fs (loop2): blocksize: 1024 [ 55.325834][ T4969] netlink: 900 bytes leftover after parsing attributes in process `syz-executor.5'. 11:15:43 executing program 4: setresuid(0x0, 0xee00, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='statm\x00') fchown(r0, 0xffffffffffffffff, 0x0) 11:15:43 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x79) 11:15:43 executing program 2: r0 = socket(0xa, 0x80003, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x890b, &(0x7f0000000000)=@buf) 11:15:43 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 11:15:43 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 11:15:43 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x346a, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 11:15:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x80, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 11:15:43 executing program 0: creat(&(0x7f0000000280)='./file1\x00', 0x0) unshare(0x2a000400) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x0, 0x2, @thr={0x0, 0x0}}) 11:15:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x60}]}) 11:15:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000100)) 11:15:43 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x3) socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000280)=""/243, 0xf3, 0x2042, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 11:15:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x6aed4000) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x10000000) 11:15:43 executing program 2: r0 = syz_io_uring_setup(0x533, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x1, 0x1ff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x266f, 0x0, 0x0, 0x0, 0x0) [ 58.249473][ T25] audit: type=1400 audit(1620645343.085:10): avc: denied { setattr } for pid=5002 comm="syz-executor.4" name="statm" dev="proc" ino=15154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 [ 58.287736][ T5014] netlink: 900 bytes leftover after parsing attributes in process `syz-executor.5'. 11:15:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="d0", 0x1}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36", 0x8e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:15:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000100)) [ 58.329996][ T5020] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 58.339084][ T5020] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 58.345702][ T25] audit: type=1326 audit(1620645343.115:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5001 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 11:15:43 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0x4) 11:15:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000100)) [ 58.386079][ T5034] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 58.394291][ T5034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 11:15:43 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x346a, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 11:15:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x80, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 11:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmat(0x0, &(0x7f000094d000/0x1000)=nil, 0x5000) pkey_mprotect(&(0x7f0000288000/0xc00000)=nil, 0xc00000, 0x0, 0xffffffffffffffff) 11:15:43 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x3) socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000280)=""/243, 0xf3, 0x2042, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 11:15:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000100)) 11:15:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x801}, 0x10) write(r0, &(0x7f0000000000)="1c0000004a009b8814e5f407000904000a0040030000000000070000", 0x1c) [ 59.073252][ T25] audit: type=1326 audit(1620645343.905:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5001 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 11:15:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000f00)=ANY=[@ANYBLOB="740300003496ad"], 0x374}}, 0x0) 11:15:44 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x0, 0x3f, 0x80}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 59.123949][ T5069] netlink: 900 bytes leftover after parsing attributes in process `syz-executor.5'. [ 59.146594][ T25] audit: type=1326 audit(1620645343.985:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5071 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 11:15:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200)="18", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="c9", 0x1, 0x48000, 0x0, 0x0) recvfrom(r0, &(0x7f0000000240)=""/82, 0x52, 0x40000022, 0x0, 0x0) 11:15:44 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x3) socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000280)=""/243, 0xf3, 0x2042, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 11:15:44 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000480), 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000004c00), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0x81}}) 11:15:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f00000001c0)={'lo\x00', &(0x7f00000000c0)=@ethtool_wolinfo={0x5, 0x0, 0x0, "0b01c8c4660a"}}) [ 59.162591][ T5073] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 59.180886][ T5073] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 59.269569][ T5097] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 59.277937][ T5097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 11:15:44 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x346a, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 11:15:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x80, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 11:15:44 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) lseek(r0, 0x80000000000001, 0x0) 11:15:44 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x3) socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000280)=""/243, 0xf3, 0x2042, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 11:15:44 executing program 4: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xffffffffffffffff) futex(&(0x7f0000000000), 0x1, 0x0, 0x0, 0x0, 0x0) 11:15:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200)="18", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="c9", 0x1, 0x48000, 0x0, 0x0) recvfrom(r0, &(0x7f0000000240)=""/82, 0x52, 0x40000022, 0x0, 0x0) 11:15:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) getsockopt$inet_tcp_buf(r2, 0x6, 0x17, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) 11:15:44 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005d832, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/exe\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000900)=[{0x0}, {0x0}, {&(0x7f0000000600)=""/200, 0x7ffff000}], 0x3, 0x0, 0x0) [ 59.980393][ T5120] netlink: 900 bytes leftover after parsing attributes in process `syz-executor.5'. [ 59.999436][ T25] audit: type=1326 audit(1620645344.835:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 11:15:44 executing program 4: r0 = fsopen(&(0x7f0000000040)='sockfs\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r0, 0x0, 0x0) close(r0) dup2(r1, r2) 11:15:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) setpgid(r0, r1) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x4}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2) write$evdev(r2, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000080)) write$evdev(r2, &(0x7f0000000140)=[{{}, 0x1f, 0x303, 0xefa7}], 0x18) ioctl$EVIOCREVOKE(r2, 0x40044591, 0x0) 11:15:44 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000003080)='.\x00', &(0x7f00000030c0)={0x0, 0x0, 0x10}, 0x18) 11:15:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') renameat(r0, &(0x7f0000000040)='./cgroup\x00', r1, &(0x7f0000000140)='./cgroup\x00') [ 60.003932][ T5125] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 60.031629][ T5125] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 60.146713][ T25] audit: type=1400 audit(1620645344.985:15): avc: denied { write } for pid=5150 comm="syz-executor.0" name="ns" dev="proc" ino=15300 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 11:15:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200)="18", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="c9", 0x1, 0x48000, 0x0, 0x0) recvfrom(r0, &(0x7f0000000240)=""/82, 0x52, 0x40000022, 0x0, 0x0) 11:15:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x80, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) dup2(r1, r2) 11:15:45 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e67", 0x18}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 11:15:45 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000003780)=[{&(0x7f0000001780)="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", 0x881}, {&(0x7f0000002780)='!', 0x1}], 0x2, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r2, 0x11, 0x200001000000067, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 11:15:45 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c007f030000000f0000070007", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 11:15:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x8000000020c, 0x121041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x4b, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0xfffffffffffffc61, 0x0}}) write$evdev(r0, &(0x7f0000000040), 0x373) 11:15:45 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x28642) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/227, 0xe3}], 0x1) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000480)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000240)="7fa2699c2982", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 60.869029][ T25] audit: type=1326 audit(1620645345.705:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5172 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 11:15:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x60) close(r1) r3 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = gettid() tkill(r4, 0x1000000000016) 11:15:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200)="18", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="c9", 0x1, 0x48000, 0x0, 0x0) recvfrom(r0, &(0x7f0000000240)=""/82, 0x52, 0x40000022, 0x0, 0x0) [ 60.919144][ T5185] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. 11:15:45 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000280)='.\x00', 0x2a4) splice(r1, 0x0, r0, 0x0, 0x100000000, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020"], 0x1c, 0x0) 11:15:45 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb0846074", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:15:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000440)=0x9, 0x1000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1d}, {0x6}]}) 11:15:48 executing program 4: r0 = socket$inet(0x10, 0x400000002, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000180007041dfffd946f610529802000001f110005000008000800030002000000", 0x24}], 0x1}, 0x0) 11:15:48 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c007f030000000f0000070007", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 11:15:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:48 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000001900)='./file0/file0\x00', &(0x7f0000001980)=[&(0x7f0000001940)='.log\x00'], &(0x7f0000001a00)=[&(0x7f00000019c0)='uid<'], 0x400) symlinkat(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 11:15:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:48 executing program 1: r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x11002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) recvfrom$inet6(r0, 0x0, 0x0, 0x2040, 0x0, 0xffce) 11:15:48 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc0105303, &(0x7f00000001c0)={{0x4}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000280)) tkill(r0, 0x7) 11:15:48 executing program 1: r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x11002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) recvfrom$inet6(r0, 0x0, 0x0, 0x2040, 0x0, 0xffce) [ 63.885892][ T25] audit: type=1326 audit(1620645348.725:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5250 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 11:15:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:48 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x28120001) 11:15:48 executing program 1: r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x11002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) recvfrom$inet6(r0, 0x0, 0x0, 0x2040, 0x0, 0xffce) [ 63.935489][ T5265] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. 11:15:48 executing program 2: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000100)=0x7beb, 0x742, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) 11:15:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002540)={&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000024c0)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}], 0x30}, 0x0) 11:15:49 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c007f030000000f0000070007", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 11:15:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x30]}}]}) syz_mount_image$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004105) 11:15:49 executing program 1: r0 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x11002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) recvfrom$inet6(r0, 0x0, 0x0, 0x2040, 0x0, 0xffce) 11:15:49 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}], 0x4924924924925a5, 0x0) 11:15:49 executing program 2: unshare(0x42000400) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 11:15:49 executing program 4: mremap(&(0x7f0000649000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mremap(&(0x7f0000649000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) 11:15:49 executing program 1: set_mempolicy(0x1, &(0x7f0000000040)=0xffffffffffffffff, 0x7) syslog(0x3, &(0x7f0000001280)=""/109, 0x6d) 11:15:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x20, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000280)=[0x0, 0x2]) 11:15:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000280)="00000000000000000000000082e36724c6f34c060000000000000078ad114000eb5648155957a2ce4dda2b7226ffd7efa1dc9ed7bcf6957f57fedf8639d1076adda9ed65f5b98112e8abb774826952c976458bc656a9f4d08e893cfd3cb7ea4479545f99123013a32a8026400448e492ff26e3f6", 0x74, 0x4e0}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) 11:15:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f00000002c0)="eb3c906d6b66732e03617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000580)=[{&(0x7f0000000440)="c7", 0x1}], 0x1, 0x0, 0x0) 11:15:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') lseek(r0, 0x3abb, 0x0) getdents64(r0, 0x0, 0x0) 11:15:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953040000000000000040f45c6237e8d0cd8ba443a00000000000000000000000000000002e92f520242028d08f0d42b60124e95dd8de9f40161e0849e499ab44dba171ad0b071de781545b1b6b100fbe0cf182f252f3eea2548f7670da842a86d5664c1640cc44a25530b9c164daea955fc727c5272ad5ac31804b0ae20e5d7c55c59f50ec9da96775782edf7df6bb6961e28238f5a9b067fcf988d4ec95e97315c5c90d44702ddc64390fb105934ca7d7256aa1ef7785b42f6d64d56280cbf1e2", 0xdb}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 64.807971][ T5338] loop2: detected capacity change from 0 to 16 [ 64.814145][ T5339] loop3: detected capacity change from 0 to 6 [ 64.816214][ T5339] FAT-fs (loop3): Directory bread(block 6) failed [ 64.827207][ T5345] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. [ 64.837202][ T5338] EXT4-fs (loop2): filesystem too large to mount safely on this system [ 64.903853][ T5338] loop2: detected capacity change from 0 to 16 [ 64.910787][ T5338] EXT4-fs (loop2): filesystem too large to mount safely on this system 11:15:50 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x800000, 0x9) 11:15:50 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c007f030000000f0000070007", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 11:15:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000001580)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x88000cc, 0x0) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) 11:15:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000140)=[{}], 0x1, 0x40100, 0x0, 0x0) epoll_wait(r1, &(0x7f0000000500)=[{}], 0x1, 0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000100)={0x80000016}) 11:15:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x300, &(0x7f0000000080), 0x4) 11:15:50 executing program 3: sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x88, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "de5e0e31038f670b55651a56d9f97bacfd3d52811ef7c9376f0a10e37206cdeb5268dc8ab0f0c28d4ab9604c03231c16ea06041c26b83b061bd428608ed4e79ad03919ec2f42fbb7c4afb2b5b80a5487176dece4dc589c0f83"}, @INET_DIAG_REQ_BYTECODE={0x11, 0x1, "83f024a8459cec07a9ad725380"}]}, 0x88}}, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)) 11:15:50 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0df99b310741e9cd8b718d85a3c51979d17b0841ae9ff2c9ad52946b8325500"/77, 0x4d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:15:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001000034700bb65e1c3e4ffff0600000001000000000000002500000004001600040001000000001f00000606040000000000000000", 0x39}], 0x1) 11:15:50 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd408", 0x5c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000280)='./file0\x00', 0x0) exit_group(0x0) 11:15:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000000)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}}, 0x0) 11:15:50 executing program 3: syz_io_uring_setup(0xe59, &(0x7f0000000200), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) fallocate(r2, 0x20, 0x45, 0x9) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r3, 0x8996, &(0x7f0000000000)) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffd28) fallocate(r0, 0x3, 0xfff000, 0x4) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 65.660663][ T5397] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. [ 65.670901][ T5399] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. 11:15:52 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0x1e, 0x0, 0x0, 0x0) 11:15:52 executing program 2: set_mempolicy(0x3, &(0x7f0000000100)=0x100000001, 0x3) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='!\x00') 11:15:52 executing program 1: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000003d40), 0x8) read$eventfd(r0, &(0x7f00000000c0), 0x8) write$eventfd(r0, &(0x7f0000000280)=0x7fffffff, 0x8) 11:15:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x19a, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:15:52 executing program 5: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB="08180000000000000000000000000000000000000000000000000000000200"/40]) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}, 0x1ef}) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@local}, &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @private=0xa110102}, 0x0, 0x0, 0x0, 0x0, 0x401, &(0x7f0000000140)='ip6tnl0\x00', 0x6, 0x1}) 11:15:52 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:15:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x0, 0x0, 0xa471}, {0x3c}, {0x2}, {0x6}]}) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) 11:15:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="79af9acfc8234ca597aa01"], 0x1c}}, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 11:15:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x19a, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:15:52 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000280)="bf85d3bdce12cdf6dd0b946d75c2cb84b3962658662ee839e084d9490ce88f", 0x1f}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 11:15:52 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 11:15:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x19a, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:15:52 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) pwritev2(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="cb", 0xf000}], 0x1, 0x0, 0x0, 0xc) 11:15:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f00000027c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x100, 0x0) [ 67.959167][ T25] audit: type=1326 audit(1620645352.796:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5455 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 68.078137][ T5469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 68.150460][ T5486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 11:15:53 executing program 1: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000003d40), 0x8) read$eventfd(r0, &(0x7f00000000c0), 0x8) write$eventfd(r0, &(0x7f0000000280)=0x7fffffff, 0x8) 11:15:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x19a, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:15:53 executing program 2: timer_create(0x2, &(0x7f0000000000)={0x0, 0x1c, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_create(0x2, 0x0, &(0x7f0000000080)=0x0) timer_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000140)={{0x77359400}, {0x0, 0x9}}, 0x0) 11:15:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x48, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/206, 0xfffffdac}], 0x1, 0x6, 0x0) 11:15:53 executing program 5: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) keyctl$chown(0x4, r0, 0xee00, 0x0) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "5cb1c33948a7c82493d7b0bfbdafba40a15777dd7eed5d5fe1244ef35994ded413d00f0dc3c9f179a1ffbcfe1977f5642d9d3ccff8d7f2c34c5a22f96544aaae"}, 0x48, r1) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r0, 0x0) 11:15:53 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x5420, 0x0) 11:15:53 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3f) close(r0) set_mempolicy(0x3, &(0x7f0000000040)=0x7, 0x7c0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:15:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 68.783895][ T25] audit: type=1326 audit(1620645353.616:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5455 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 11:15:53 executing program 3: creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x3, &(0x7f0000000040)=[0x0, 0xee01, 0x0]) lchown(&(0x7f0000000080)='./bus\x00', 0x0, r1) 11:15:53 executing program 0: clock_gettime(0x9, &(0x7f0000000180)) 11:15:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') 11:15:53 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r1, 0x0, 0xf0ff7f, 0x0, 0x0, 0x0) tkill(r0, 0x7) 11:15:54 executing program 1: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000003d40), 0x8) read$eventfd(r0, &(0x7f00000000c0), 0x8) write$eventfd(r0, &(0x7f0000000280)=0x7fffffff, 0x8) 11:15:54 executing program 5: clock_getres(0x0, &(0x7f0000000440)) 11:15:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x6, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:15:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$sock_timeval(r0, 0x1, 0x9, 0x0, &(0x7f0000000080)) 11:15:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000001c0)={0x2c, r1, 0x88cea81548ac8d2f, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x4, 0x2, 'syzkaller0\x00'}]}]}, 0x2c}}, 0x0) 11:15:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x3}) 11:15:54 executing program 2: unshare(0x40000000) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 11:15:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001700)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0005003500281e1400000009000f407fdeafcb634803535631a1a314ba790695cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) 11:15:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f00000002c0), 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x8, 0x0, &(0x7f0000000040)) 11:15:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)={0x120, 0x30, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0x8, 0x1, 0x0, 0x0, @ipv4=@multicast1}, @nested={0xfd, 0x0, 0x0, 0x1, [@generic="f3df8a30245bcffb1a87999f5514ba89766d2481515bce79aca8d87343f936cd5dbb664ab8d42a8f63504e1a11fecd1e6c7c547274ed7d027c4c51bab75555cb91b636623867a41ddcbf942988195b91", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="3a98f661e0e1", @typed={0x69, 0x0, 0x0, 0x0, @binary="50432e5df83565ca721ef580fc37394b3c7e6628bad4f09c6684c9860f3234a0dedf8b11a9f14d0b13bca306f1e997462e78fabceadf50605e17cef98488dc06c9768fe3e1be41e956d9b771942d9fd6ff770da414dcc72b299d70dbd3f9b4e189b9886df4"}, @generic="1bb52abfb6053e9856cd87dced50f665e253aea18384ffa905a4cae825000000", @generic="88182229a2c73d97c19b07574bdf2d"]}]}, 0x120}], 0x1}, 0x0) 11:15:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 11:15:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001700)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0005003500281e1400000009000f407fdeafcb634803535631a1a314ba790695cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) [ 69.743143][ T5583] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 69.752337][ T5583] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 69.760767][ T5583] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.0'. [ 69.789675][ T5590] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 69.822373][ T5607] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 69.830560][ T5607] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 69.838918][ T5607] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.0'. 11:15:55 executing program 1: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000003d40), 0x8) read$eventfd(r0, &(0x7f00000000c0), 0x8) write$eventfd(r0, &(0x7f0000000280)=0x7fffffff, 0x8) 11:15:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) pwritev(r5, &(0x7f0000002700)=[{&(0x7f0000000540)='2', 0x1}], 0x1, 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffff) fcntl$addseals(r5, 0x409, 0x8) fremovexattr(r5, &(0x7f00000000c0)=@known='system.posix_acl_access\x00') dup3(r4, r5, 0x0) 11:15:55 executing program 3: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000640)="c1", 0x1) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/consoles\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000000)=r1, 0x1) keyctl$update(0x2, 0x0, 0x0, 0x2) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @multicast1}, 0xc) 11:15:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001700)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0005003500281e1400000009000f407fdeafcb634803535631a1a314ba790695cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) 11:15:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0107000000000000000020000000080008"], 0x1c}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 11:15:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2e, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:15:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001700)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0005003500281e1400000009000f407fdeafcb634803535631a1a314ba790695cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) [ 70.565820][ T5628] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 70.574425][ T5628] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 70.583089][ T5628] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.0'. [ 70.597371][ T5629] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 11:15:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcff86ff770403000000030000000020000000000000400000000000080000bf", 0x200000bf}], 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x42) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 11:15:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcff86ff770403000000030000000020000000000000400000000000080000bf", 0x200000bf}], 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x42) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 11:15:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcff86ff770403000000030000000020000000000000400000000000080000bf", 0x200000bf}], 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x42) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) [ 70.629567][ T5642] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 70.637801][ T5642] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 70.646021][ T5642] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.0'. 11:15:55 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 11:15:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcff86ff770403000000030000000020000000000000400000000000080000bf", 0x200000bf}], 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x42) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 11:15:55 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_io_uring_setup(0x136f, &(0x7f0000000080), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) fcntl$setlease(r0, 0x400, 0x2) 11:15:56 executing program 0: mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(r0, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)) 11:15:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000000)={0x3, 'team_slave_1\x00', {0x1}, 0x5}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r1) 11:15:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:56 executing program 1: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) 11:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 0: mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(r0, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)) 11:15:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0xc06bfd4b70e7f791, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_VENDOR_ID={0x8}]}, 0x30}}, 0x0) 11:15:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2e, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:15:58 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 11:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x80000000) 11:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 0: mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(r0, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)) 11:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 11:15:58 executing program 1: r0 = socket(0x2, 0x3, 0x3) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2}, 0x2000000c, &(0x7f0000000340)={0x0, 0x2}}, 0x810) 11:16:01 executing program 2: unshare(0x20600) r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 11:16:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2e, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:01 executing program 5: set_mempolicy(0x1, &(0x7f00000001c0)=0x9, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000740)={0x2, &(0x7f0000000700)=[{0x3d}, {0x6}]}) 11:16:01 executing program 0: mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(r0, &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000007c0)) 11:16:01 executing program 1: r0 = socket(0x2, 0x3, 0x3) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2}, 0x2000000c, &(0x7f0000000340)={0x0, 0x2}}, 0x810) 11:16:01 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 11:16:01 executing program 1: r0 = socket(0x2, 0x3, 0x3) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2}, 0x2000000c, &(0x7f0000000340)={0x0, 0x2}}, 0x810) 11:16:01 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x540a, 0x0) 11:16:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') mknodat$null(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) 11:16:01 executing program 1: r0 = socket(0x2, 0x3, 0x3) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x2}, 0x2000000c, &(0x7f0000000340)={0x0, 0x2}}, 0x810) 11:16:01 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02090500000001000000ff07000000ffffff82000800000000000000004000ffffff85", 0x23}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0xc00}, &(0x7f0000000100)=0x30) [ 76.680110][ T25] audit: type=1326 audit(1620645361.516:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5790 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 11:16:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x86, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66fe03006f324b8015e6665b50b9a8d70f9345bd9707d6f2beb28e778c3b6d80a7683634d204584d022cb003e2ab4494ac642d8fc368fdd5c24fd9ad26e6747936b4714ba9ca80575f15873721299aa25061fe1b9480843f41"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001280)=""/4094, 0xffe}], 0x1) timerfd_settime(r1, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849078267, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) [ 76.805386][ T5829] warning: process `syz-executor.1' used the obsolete bdflush system call [ 76.814026][ T5829] Fix your initscripts? 11:16:04 executing program 2: setrlimit(0xbd4ae34dad1d7331, &(0x7f0000000000)) 11:16:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x2e, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:04 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000bd000), 0xb6aecfd79b18c3ef, 0x0) connect$unix(r0, &(0x7f0000004dc0)=@file={0x0, './file0\x00'}, 0x6e) 11:16:04 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe2(&(0x7f0000000f40)={0xffffffffffffffff}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 11:16:04 executing program 0: r0 = syz_io_uring_setup(0x1370, &(0x7f0000000080), &(0x7f0000110000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000480)={0x0, 0x0, 0x0}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 11:16:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "549e54a7df21d8a8d2018fd15360a9a8b538bae9d530945c665b71130dcd28138da140889313551cb3fd700004000000000000af70bdcdce88f39d8f37bbfeac2cbe2dada796a094b0234615c8a5f763"}, 0xd8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f000007c000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0xffffffffffffff76) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) 11:16:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000540), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}]}, 0x30}}, 0x0) 11:16:04 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[], 0xe) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x10000101) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r0, 0x3, 0x6, 0xffff) fallocate(r0, 0x0, 0x0, 0x10000103) 11:16:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 11:16:04 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x34, 0x0, 0x0, 0xfffffffe}, {0x4}, {0x6}]}) prlimit64(0x0, 0x0, 0x0, 0x0) [ 79.782166][ T25] audit: type=1326 audit(1620645364.616:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 11:16:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x86, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66fe03006f324b8015e6665b50b9a8d70f9345bd9707d6f2beb28e778c3b6d80a7683634d204584d022cb003e2ab4494ac642d8fc368fdd5c24fd9ad26e6747936b4714ba9ca80575f15873721299aa25061fe1b9480843f41"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:04 executing program 2: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) [ 79.820157][ T25] audit: type=1326 audit(1620645364.616:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=76 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.844620][ T25] audit: type=1326 audit(1620645364.616:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.882272][ T25] audit: type=1326 audit(1620645364.616:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.901629][ T5901] warning: process `syz-executor.1' used the obsolete bdflush system call 11:16:04 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1000000, 0xa0000}, 0x20) [ 79.907263][ T25] audit: type=1326 audit(1620645364.616:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.915580][ T5901] Fix your initscripts? [ 79.945498][ T25] audit: type=1326 audit(1620645364.616:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=9 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.989010][ T25] audit: type=1326 audit(1620645364.616:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 79.999172][ T5898] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 80.025843][ T5898] File: /root/syzkaller-testdir600862066/syzkaller.waVhuE/50/bus PID: 5898 Comm: syz-executor.2 [ 80.031491][ T25] audit: type=1326 audit(1620645364.616:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 80.072664][ T25] audit: type=1326 audit(1620645364.626:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5884 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=85 compat=0 ip=0x4665f9 code=0x7ffc0000 11:16:07 executing program 2: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x2, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4, 0x19}]}, 0x18}}, 0x0) 11:16:07 executing program 5: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000340)) 11:16:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x1265, 0x0) 11:16:07 executing program 0: getgroups(0x3fffffffffffff63, &(0x7f0000004300)=[0xee01, 0x0, 0xee01, 0x0, 0xee00, 0x0, 0x0, 0xee00]) 11:16:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xd, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xa, 0x0, 0x0) 11:16:07 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 11:16:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 11:16:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x86, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66fe03006f324b8015e6665b50b9a8d70f9345bd9707d6f2beb28e778c3b6d80a7683634d204584d022cb003e2ab4494ac642d8fc368fdd5c24fd9ad26e6747936b4714ba9ca80575f15873721299aa25061fe1b9480843f41"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xd, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xa, 0x0, 0x0) 11:16:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000000) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') preadv(r1, &(0x7f0000000180)=[{&(0x7f0000027040)=""/102395, 0x18ffb}], 0x1, 0x0, 0x0) [ 82.868273][ T5929] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 82.880428][ T5929] File: /root/syzkaller-testdir600862066/syzkaller.waVhuE/51/bus PID: 5929 Comm: syz-executor.2 11:16:07 executing program 2: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000b40)="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", 0x296, 0x11580}], 0x0, &(0x7f0000000080)) 11:16:07 executing program 5: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xd, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xa, 0x0, 0x0) 11:16:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)}, 0x20, 0x0, 0x0) [ 82.936356][ T5969] warning: process `syz-executor.1' used the obsolete bdflush system call [ 82.945505][ T5969] Fix your initscripts? 11:16:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xd, 0xd9f, 0x0) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xa, 0x0, 0x0) [ 83.014841][ T5982] loop0: detected capacity change from 0 to 4101 [ 83.027523][ T5982] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended 11:16:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000b40)="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", 0x296, 0x11580}], 0x0, &(0x7f0000000080)) [ 83.058670][ T5982] EXT4-fs error (device loop0): ext4_orphan_get:1413: comm syz-executor.0: bad orphan inode 17 [ 83.071225][ T5982] ext4_test_bit(bit=16, block=18) = 1 [ 83.077318][ T5982] is_bad_inode(inode)=0 [ 83.081652][ T5982] NEXT_ORPHAN(inode)=6673 [ 83.086015][ T5982] max_ino=32 [ 83.089223][ T5982] i_nlink=0 [ 83.092833][ T5982] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1050: updating to rev 1 because of new feature flag, running e2fsck is recommended 11:16:08 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000040), 0xffff, 0x8080) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)=0x200) 11:16:08 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) [ 83.107530][ T5982] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 83.175720][ T5991] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 83.188698][ T5991] File: /root/syzkaller-testdir040988831/syzkaller.QFsRGA/33/bus PID: 5991 Comm: syz-executor.5 [ 83.235019][ T6016] loop0: detected capacity change from 0 to 4101 [ 83.253588][ T6016] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 83.270221][ T6016] EXT4-fs error (device loop0): ext4_orphan_get:1413: comm syz-executor.0: bad orphan inode 17 [ 83.280991][ T6016] ext4_test_bit(bit=16, block=18) = 1 [ 83.286452][ T6016] is_bad_inode(inode)=0 [ 83.290899][ T6016] NEXT_ORPHAN(inode)=6673 [ 83.295264][ T6016] max_ino=32 [ 83.298834][ T6016] i_nlink=0 [ 83.302481][ T6016] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1050: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 83.317627][ T6016] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 11:16:10 executing program 5: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x86, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32950a73e7f7dbf4cffd64b66fe03006f324b8015e6665b50b9a8d70f9345bd9707d6f2beb28e778c3b6d80a7683634d204584d022cb003e2ab4494ac642d8fc368fdd5c24fd9ad26e6747936b4714ba9ca80575f15873721299aa25061fe1b9480843f41"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:16:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000b40)="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", 0x296, 0x11580}], 0x0, &(0x7f0000000080)) 11:16:10 executing program 2: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x208200) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f00000001c0)={0x3}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x400, 0x0) lseek(r5, 0xda, 0x1) sendfile(r3, r4, 0x0, 0xffffdffa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 11:16:10 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="66530700ae897094e7b1058000000000000005c41bd34e677de3f3de728d33b0994dd7cb4e0e71558d07b83c7b0a8783f20ec92ce07a6e5a0f045044f97d0e989ce35a3288bf0015b34f49d788bbe94f5f3647d3778ca204a19e1e2cbf9622bfbb84c4147574456173150b00000000000000ac8436caf00d34ac55966e539b895a6869d52ed8055df2063fd85db4ebb6834c65720456a0b816d05d35730d445992a59d0026005ab3f25ab186b66a8e391e15720c751edc8882836537dee008cc7b6181eacd6ffb85f611e45534b430b5ff7b3a9a4fcdb2d56b9e9e5ea582904929b7a027f4b3f48285b5", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 11:16:10 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x4b, 0x0, 0x0) 11:16:10 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5, 0x0) [ 85.950832][ T6038] loop0: detected capacity change from 0 to 4101 [ 85.967403][ T6038] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 85.980763][ T6038] EXT4-fs error (device loop0): ext4_orphan_get:1413: comm syz-executor.0: bad orphan inode 17 11:16:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x181, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 85.981105][ T6052] warning: process `syz-executor.1' used the obsolete bdflush system call [ 85.992756][ T6038] ext4_test_bit(bit=16, block=18) = 1 [ 86.001619][ T6052] Fix your initscripts? [ 86.007526][ T6038] is_bad_inode(inode)=0 [ 86.015987][ T6038] NEXT_ORPHAN(inode)=6673 [ 86.020350][ T6038] max_ino=32 [ 86.023551][ T6038] i_nlink=0 [ 86.072942][ T6062] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 86.096648][ T6062] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 86.105855][ T6044] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! 11:16:11 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x18190, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000140), 0xffffff1f) 11:16:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x80002005}) epoll_wait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0) 11:16:11 executing program 2: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000140007041dfffd946f6105000a0000e8fe0208010400080008000e000400ff7e", 0x24}], 0x1}, 0x0) [ 86.117932][ T6044] File: /root/syzkaller-testdir600862066/syzkaller.waVhuE/53/bus PID: 6044 Comm: syz-executor.2 [ 86.142826][ T6038] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1050: updating to rev 1 because of new feature flag, running e2fsck is recommended 11:16:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x100560}, {&(0x7f00000000c0)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000000b40)="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", 0x296, 0x11580}], 0x0, &(0x7f0000000080)) [ 86.183722][ T6038] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 11:16:11 executing program 4: setitimer(0x2, 0x0, &(0x7f0000000080)) [ 86.328897][ T6091] loop0: detected capacity change from 0 to 4101 [ 86.331693][ T6092] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 86.352467][ T6091] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 86.362555][ T6091] EXT4-fs error (device loop0): ext4_orphan_get:1413: comm syz-executor.0: bad orphan inode 17 [ 86.373015][ T6091] ext4_test_bit(bit=16, block=18) = 1 [ 86.379087][ T6091] is_bad_inode(inode)=0 [ 86.383649][ T6091] NEXT_ORPHAN(inode)=6673 [ 86.388038][ T6091] max_ino=32 [ 86.391237][ T6091] i_nlink=0 [ 86.407289][ T6091] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1050: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 86.428235][ T6091] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 11:16:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') read$char_usb(r0, &(0x7f0000000280)=""/4096, 0x1000) 11:16:13 executing program 2: clone(0x4380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x10, r0) ptrace$peeksig(0x4209, r0, &(0x7f00000000c0)={0x0, 0x0, 0xffffff22}, &(0x7f0000000100)=[{}]) 11:16:13 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x80585414, 0x0) 11:16:13 executing program 4: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x1000, 0x0) r0 = open(&(0x7f00000000c0)='./file1\x00', 0x141042, 0x0) io_setup(0x2, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 11:16:13 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x0, 0x8}) 11:16:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x840}, 0x18) 11:16:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0) 11:16:13 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$unix(0x1, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) 11:16:13 executing program 0: r0 = io_uring_setup(0x7780, &(0x7f0000000000)) set_mempolicy(0x1, 0x0, 0x0) io_uring_setup(0x65d0, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 11:16:13 executing program 1: clone(0x66000d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r0, 0x8994, &(0x7f0000000000)=':') [ 88.990677][ T25] kauditd_printk_skb: 5 callbacks suppressed [ 88.990690][ T25] audit: type=1326 audit(1620645373.826:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 11:16:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000004a80)={0x1, &(0x7f0000004a40)=[{0x35}]}) 11:16:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x10a, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:16:13 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xa4f0, 0x0, &(0x7f00000001c0), 0x10) [ 89.057656][ T6132] new mount options do not match the existing superblock, will be ignored [ 89.082541][ T6132] new mount options do not match the existing superblock, will be ignored [ 89.089348][ T25] audit: type=1326 audit(1620645373.836:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=437 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 89.159064][ T25] audit: type=1326 audit(1620645373.836:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 89.193584][ T25] audit: type=1326 audit(1620645373.836:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 89.233892][ T25] audit: type=1326 audit(1620645373.856:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6121 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 11:16:14 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0x1) open$dir(&(0x7f0000000280)='./file0\x00', 0x20900, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 11:16:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x8001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e62}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40006003) 11:16:14 executing program 5: setxattr(0x0, 0x0, &(0x7f0000000240)='$#.!\x00', 0x5, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 11:16:14 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lchown(&(0x7f0000000080)='./bus\x00', 0xee00, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 11:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x0) 11:16:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0080f785f3a7d3ff", "00957affffffff00000100", "20040100", "00000100"}, 0x28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 11:16:14 executing program 4: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x68, 0x0, &(0x7f0000000180)) 11:16:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo\x00') getdents64(r0, &(0x7f0000000200)=""/41, 0x29) getdents64(r0, &(0x7f0000000040)=""/126, 0x7e) 11:16:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2a, &(0x7f0000000180)={0x2, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 11:16:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x201, 0xffffffff, 0x0, {}, [@CTA_NAT_SRC={0x4, 0x19}, @CTA_ZONE={0x6}]}, 0x20}}, 0x0) 11:16:14 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x201000) [ 89.858178][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:16:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 90.001979][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:16:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) fsetxattr$security_capability(r2, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setuid(0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 11:16:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='showexec']) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) 11:16:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:16:15 executing program 3: semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)) 11:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0080f785f3a7d3ff", "00957affffffff00000100", "20040100", "00000100"}, 0x28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 11:16:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff080004000000282459801b", 0x39}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 11:16:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:16:15 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x748}) [ 90.770630][ T6261] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 90.770828][ T6258] loop0: detected capacity change from 0 to 6 [ 90.808771][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:16:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000001ac0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 11:16:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1130}}], 0x2, 0x0) 11:16:15 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 11:16:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4d, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:16:15 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x2a, 0x0, 0x0) [ 90.811338][ T6258] FAT-fs (loop0): Directory bread(block 6) failed [ 90.836662][ T6261] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 90.853522][ T6261] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 11:16:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="665307ac268659daf00942e87700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b49b374a8db38f609f975ceb0364d8627dc2c6c5bd27661ecbaff4483adf064c1315d505dab3c3424c0fbaa43d6d6254129e1971ea3910554197da377b6cf2c1758aaefdf6fecdf70817d0204550dd2c9e9bc1e53eaddb957984ea039e08e8765c957b82978d61c13ef1cc456acc8ed5536372d31d0546e3224115e6e5497d95e66d87758d511e287e24aa2223cf718dc9aadef0cd3b9316557615d12a8bce9ca37ec72b3a2eea6352cf4c299be159344e21644612cece16769b2bdb17fecc2e6ee294c3ba2e3007681e571c116", 0xf4}], 0x4, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:16:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff080004000000282459801b", 0x39}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 11:16:15 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x2a, 0x0, 0x0) 11:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0080f785f3a7d3ff", "00957affffffff00000100", "20040100", "00000100"}, 0x28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 11:16:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000004, 0x4000051, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="dc7afea08184959730ba75ccefbbc44b0a03a9e45afc4ef3be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93ec6bccc58a459830a1e94740e06d94342c64dd8165ebea25878b8a8da2560890b8f323579e284fe7fafd05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb095ca2295"], 0x100) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 90.899722][ T6271] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 11:16:15 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000140)=@isofs_parent={0x14, 0x2, {0xb00}}, 0xfeffffff) 11:16:15 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x2a, 0x0, 0x0) 11:16:15 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="5500000018007f1800fe15b282a380930a60000248a84308916d0200390006002300ff6c020000000b000500fec0ffff000b566881b18432009b1100b1df13000000fb0000400000000040970de3b3000000000900", 0x55}], 0x1, 0x0, 0x0, 0xe0ffffff}, 0x0) 11:16:15 executing program 3: keyctl$join(0x5, 0x0) [ 91.001977][ T6311] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 91.020343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 91.042968][ T6311] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 91.097775][ T6328] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 91.108399][ T6328] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 91.115900][ T6328] IPv6: NLM_F_CREATE should be set when creating new route 11:16:16 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b863c79f5772cab115af07794c89b2b77c52a37d4d0f04aeb2b84dc77e71cf1e03baa8f8640b9feb36f252b0bd1e19009f3f3dc703038", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 11:16:16 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x2a, 0x0, 0x0) 11:16:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff080004000000282459801b", 0x39}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 11:16:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0080f785f3a7d3ff", "00957affffffff00000100", "20040100", "00000100"}, 0x28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 11:16:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f00000000c0)='.', 0x0, 0x2233080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1002, 0x0) mount(&(0x7f00000003c0)=@filename='./file0\x00', &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 11:16:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x85}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffbfffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffa]}, 0x0, 0x0, 0x8) tkill(r2, 0x12) 11:16:16 executing program 4: modify_ldt$write(0x1, &(0x7f00000002c0)={0x7ff}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:16:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff080004000000282459801b", 0x39}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r1) 11:16:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast1}}, 0x1, 0x1, [{{0x2, 0x0, @loopback}}]}, 0x110) 11:16:16 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @val={0x2c, [0x37]}}}}]}) 11:16:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x168, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 91.824714][ T6341] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 91.842373][ T6341] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 91.852686][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:16:16 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000500)='Kt ', 0x3}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 11:16:16 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff94b766e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:16:16 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c30c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) lseek(r1, 0x0, 0x2) creat(0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) 11:16:16 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) utimes(0x0, &(0x7f00000000c0)) 11:16:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffff41, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@hopopts={{0x18, 0x29, 0xb}}], 0x24}}], 0x1, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e23, 0x7, @remote, 0x80}, 0x1c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 11:16:16 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0x40505331, &(0x7f00000001c0)={{0x0, 0x99}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) close(r1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x7) [ 91.920655][ T6365] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 91.951446][ T6369] tmpfs: Bad value for 'mpol' [ 92.012355][ T6392] loop5: detected capacity change from 0 to 264192 11:16:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x98) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:16:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4}, {0x7}, {0x6}]}) 11:16:17 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000103, 0xb, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 11:16:17 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) fsetxattr$security_selinux(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0/file1\x00') 11:16:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) ptrace(0x4208, r0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 11:16:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='umask=00000000000000000000040,nodots,debug']) 11:16:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0xc00000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) ftruncate(r2, 0x2008000) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, 0x0}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 92.710679][ T6434] loop2: detected capacity change from 0 to 264192 [ 92.715431][ T6430] FAT-fs (loop3): bogus number of reserved sectors [ 92.724251][ T6430] FAT-fs (loop3): Can't find a valid FAT filesystem [ 92.725883][ T6434] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802c018, mo2=0006] [ 92.761574][ T25] audit: type=1326 audit(1620645377.596:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6423 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 92.793012][ T6434] System zones: 1-2, 19-19, 35-38, 46-46 11:16:17 executing program 2: process_vm_writev(0x0, &(0x7f0000001200)=[{&(0x7f0000000000)=""/219, 0xdb}], 0x1, &(0x7f00000026c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 92.809775][ T6434] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 92.821340][ T6434] ext4 filesystem being mounted at /root/syzkaller-testdir600862066/syzkaller.waVhuE/62/file0 supports timestamps until 2038 (0x7fffffff) 11:16:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4}, {0x7}, {0x6}]}) 11:16:17 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f00000010c0)) [ 92.862508][ T6430] FAT-fs (loop3): bogus number of reserved sectors [ 92.869384][ T6430] FAT-fs (loop3): Can't find a valid FAT filesystem 11:16:17 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="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", 0x133}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:16:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4}, {0x7}, {0x6}]}) 11:16:17 executing program 2: socket$inet6(0xa, 0x80000, 0x73d1d8ac) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000002c0)={0x0, {{0xa, 0x4e24, 0x9, @private0, 0x8}}}, 0x88) syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000002c0)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x81, 0x1, 0x1c, 0x10, "9143281e53d2ea719c6914229cbea2c0dada6cd112a8b576720514cb69b4e055ddcec803c67dbc20f98a4a1b2bc2b7c692a1faae7990f0e0990ac118bf89b7b4", "ffdb5fed6246830e0a3cd17361d2fa37830b6042e962ff52261734fd5f778bb1", [0x3ff, 0x3]}) 11:16:17 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f00000010c0)) [ 92.955253][ T25] audit: type=1326 audit(1620645377.786:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6466 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 11:16:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4}, {0x7}, {0x6}]}) [ 93.080055][ T25] audit: type=1326 audit(1620645377.896:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6478 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 11:16:18 executing program 5: request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0) [ 93.153986][ T25] audit: type=1326 audit(1620645377.976:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6496 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 93.180847][ T25] audit: type=1400 audit(1620645378.016:44): avc: denied { mac_admin } for pid=6424 comm="syz-executor.5" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 11:17:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in=@loopback}, {@in=@dev, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x40, "8d507b2f"}}]}, 0x140}}, 0x0) ftruncate(r3, 0x6) truncate(&(0x7f0000000340)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x103fd, 0x8) 11:17:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b20778cb2e5bcf97c4c73ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e1a84d0e2441a", 0xf8}], 0x4, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=00000000000000000000', @ANYRESHEX]) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:17:07 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f00000010c0)) 11:17:07 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x1c3342) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000740)="0000500000570102396720a09e466e2c0cc36d6122c42f5502b15f95b0948dc27717ed5b00c03b3d66a1bf23b7ff9a66eb2da72260577e701cb3bbae68db16979833c4ee13a85aa07b1f39121e35d10460640137d4f6373f11c8", 0x8}, {&(0x7f00000000c0)="87", 0x1}, {&(0x7f0000000600)="06ba182d08d83bd2d5c9b8d981fcdc659a7363b12b1629b4b141446adc79dd5fe48d738e6b6d4b356690b8c7fc0d70530756838d196dae6911ea19bc183afe0fc3963ebe15da2158000cbddee4d2f1faa6bc5db7e8eed1916d7daaf07fef1b75531d8d9d0f2c56d2d228cfc7a482ad3c9557febff02a99417c8d6315338ce7a36c2d393074818937f668bd3284f6123da899e38f514ab64c0cc1", 0x9a}, {&(0x7f0000000440)="32e7be86b1a82380305dd2385c2bd95112e9fe59cb5b92358fd418201aa61db2f9b0775406e25afc6384dc5c65feae5eea30fb537e106c9a91d5fc0d5d8303fa4c90f5921d1eca50241fdc09fc9e4992fe15862a3209d613437a8cff81ef6d2761317624cf31e813d620aac577e05acd2130272bd8c446057899bb5e0f4c557e", 0xfe96}, {&(0x7f0000000540)="be9b24c30119f4f76f65", 0xa}], 0x5, 0x0, 0x0) 11:17:07 executing program 2: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = getpid() r3 = pidfd_open(r2, 0x0) r4 = dup3(r3, r1, 0x0) setns(r4, 0x8000000) 11:17:07 executing program 5: select(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 11:17:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b20778cb2e5bcf97c4c73ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e1a84d0e2441a", 0xf8}], 0x4, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=00000000000000000000', @ANYRESHEX]) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:17:07 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f00000010c0)) 11:17:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@remote}, 0x0, @in=@loopback}}, 0xe8) 11:17:07 executing program 2: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/167, 0xa7}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000008a40)=""/237, 0xed}], 0x3}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1f, 0x4) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xffe0) recvmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) 11:17:07 executing program 4: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x720d, 0x1000}, {0x0, 0x8}, {0x0, 0xfff8}], 0x3) 11:17:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b20778cb2e5bcf97c4c73ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e1a84d0e2441a", 0xf8}], 0x4, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=00000000000000000000', @ANYRESHEX]) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 144.170411][ T6568] cgroup: Unknown subsys name 'perf_event' [ 144.177119][ T6568] cgroup: Unknown subsys name 'net_cls' 11:17:11 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:17:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f0000000380)=ANY=[]) umount2(&(0x7f0000000000)='./file1\x00', 0x8) 11:17:11 executing program 4: unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) 11:17:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@remote}, 0x0, @in=@loopback}}, 0xe8) 11:17:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r0, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = socket$unix(0x1, 0x801, 0x0) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 11:17:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9a05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b20778cb2e5bcf97c4c73ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e1a84d0e2441a", 0xf8}], 0x4, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='mode=00000000000000000000', @ANYRESHEX]) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:17:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') exit_group(0x0) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 11:17:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fccba20bcae2b6f577b36b79f72f77e153f55e4fa6ad43af0d450a8f2c60baabf84ab4350874b05f4635c7449bac4383622ae4da09326e51bc3130b44a9df8704c9656b60912ff6bdb6fb1f138ece7e020fc235330fb8f4e6ad5d3e561792a74c", 0x131}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 11:17:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@remote}, 0x0, @in=@loopback}}, 0xe8) 11:17:11 executing program 4: syz_io_uring_setup(0x2cba, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) 11:17:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000d00)={0x0, @l2tp={0x2, 0x0, @dev}, @in={0x2, 0x0, @dev}, @phonet, 0x4}) 11:17:11 executing program 2: unshare(0x20000600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x64800280, 0x0, 0x0, 0x0, 0x0) 11:17:11 executing program 1: unshare(0x400) r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x21000f16) [ 146.249585][ T7055] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 11:17:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f0000000380)=ANY=[]) umount2(&(0x7f0000000000)='./file1\x00', 0x8) 11:17:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@remote}, 0x0, @in=@loopback}}, 0xe8) 11:17:11 executing program 0: clone3(&(0x7f0000000580)={0x200500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000340)={0x50000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) clone3(&(0x7f0000000dc0)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:17:11 executing program 4: syz_io_uring_setup(0x2cba, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) [ 146.294795][ T7055] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 11:17:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0xfffffffffffffffd) 11:17:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 11:17:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x2, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_wait(r2, &(0x7f0000000040), 0x51, 0xfffffef6) shutdown(r1, 0x1) r3 = dup3(r1, r2, 0x0) shutdown(r3, 0x0) 11:17:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0xfffffffffffffffd) 11:17:11 executing program 4: syz_io_uring_setup(0x2cba, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) 11:17:11 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200a0000000000000000e50c1be3a20400007e280000005e00ff03c81f8374b4c125a4ffba16a0aa1c0009b3ebea966cf0554e", 0x44}, {&(0x7f0000000240)="971db4e786948f23", 0x8}], 0x2}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0xa00e0004, 0x0}}], 0x300, 0x42, 0x0) [ 146.419304][ T7112] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 146.431326][ T25] audit: type=1400 audit(1620645431.265:45): avc: denied { sys_admin } for pid=7105 comm="syz-executor.0" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 11:17:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0xfffffffffffffffd) 11:17:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f0000000380)=ANY=[]) umount2(&(0x7f0000000000)='./file1\x00', 0x8) 11:17:11 executing program 4: syz_io_uring_setup(0x2cba, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x3000)=nil) 11:17:11 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001640)={@private0, 0x800, 0x0, 0x2, 0xf, 0x4, 0x2}, 0x20) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0xfffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r4, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) [ 146.602116][ T7156] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 11:17:11 executing program 0: clone3(&(0x7f0000000580)={0x200500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000340)={0x50000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) clone3(&(0x7f0000000dc0)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:17:11 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000140)=0x39) r2 = gettid() tkill(r2, 0x40) 11:17:11 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file1\x00') syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f0000000380)=ANY=[]) umount2(&(0x7f0000000000)='./file1\x00', 0x8) 11:17:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0xfffffffffffffffd) 11:17:11 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000002600), 0x8, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x6a808b7fd0284b4d) [ 146.656601][ T7164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.679493][ T7164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 11:17:11 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400)=';', 0x1) write$P9_RREADLINK(r2, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) creat(&(0x7f00000000c0)='./bus\x00', 0x1b) [ 146.702127][ T7164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.721359][ T7175] EXT4-fs warning (device sda1): ext4_group_extend:1793: can't shrink FS - resize aborted [ 146.730149][ T7178] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 11:17:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000f40)={0x0, 0x0, 0x0}, 0x0) 11:17:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0xc4, 0x4) recvmmsg(r0, &(0x7f0000009940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010041, 0x0) [ 146.747993][ T7164] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.2'. [ 146.757717][ T7164] device lo entered promiscuous mode [ 146.778728][ T7164] device sit0 entered promiscuous mode [ 146.791944][ T7175] EXT4-fs warning (device sda1): ext4_group_extend:1793: can't shrink FS - resize aborted 11:17:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x37, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 146.796479][ T7164] device ÿ entered promiscuous mode 11:17:11 executing program 0: clone3(&(0x7f0000000580)={0x200500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000340)={0x50000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) clone3(&(0x7f0000000dc0)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:17:11 executing program 5: mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, 0x0) open(0x0, 0x48900, 0x120) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) keyctl$get_persistent(0x16, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x60000000) [ 146.835284][ T7194] loop1: detected capacity change from 0 to 264192 [ 146.864013][ T7194] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 147.152172][ T41] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:12 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001640)={@private0, 0x800, 0x0, 0x2, 0xf, 0x4, 0x2}, 0x20) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0xfffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r4, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 11:17:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0xcb29db0f4a3ced69) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 11:17:12 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x80240, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 11:17:12 executing program 0: clone3(&(0x7f0000000580)={0x200500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000340)={0x50000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x0], 0x1}, 0x58) clone3(&(0x7f0000000dc0)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:17:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000340)=[{0x5c}, {0x1d}, {0x6}]}) syz_io_uring_complete(0x0) 11:17:12 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400)=';', 0x1) write$P9_RREADLINK(r2, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) creat(&(0x7f00000000c0)='./bus\x00', 0x1b) [ 147.490278][ T7212] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.499993][ T7212] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.509859][ T7261] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.519385][ T7260] netlink: 40027 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.549142][ T7265] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.569483][ T7265] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 11:17:12 executing program 3: setpriority(0x1, 0x0, 0x6) [ 147.584004][ T25] audit: type=1326 audit(1620645432.415:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7268 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 147.615812][ T7273] loop1: detected capacity change from 0 to 264192 [ 147.618662][ T7273] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:12 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x50, r2, 0x9, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x3}]}]}, 0x50}}, 0x0) 11:17:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) dup2(r0, r1) 11:17:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af4f82dfefd5e00d421b00000000", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:17:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f000000e340)=[{{&(0x7f0000003b40)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000003e40)=[{0x10, 0x29, 0x3b}], 0x10}}], 0x1, 0x0) [ 147.618972][ T7278] 9pnet: Insufficient options for proto=fd [ 147.622385][ T7293] 9pnet: Insufficient options for proto=fd 11:17:12 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 147.803046][ T1343] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:13 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001640)={@private0, 0x800, 0x0, 0x2, 0xf, 0x4, 0x2}, 0x20) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0xfffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r4, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 11:17:13 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400)=';', 0x1) write$P9_RREADLINK(r2, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) creat(&(0x7f00000000c0)='./bus\x00', 0x1b) 11:17:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r0, 0x1, 0x1, 0x0, &(0x7f0000000140)) 11:17:13 executing program 3: unshare(0x6c060000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000005d00)={'filter\x00', 0x21880}, &(0x7f0000000080)=0x54) 11:17:13 executing program 5: pipe2(&(0x7f00000015c0)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close_range(r1, 0xffffffffffffffff, 0x2) tee(r0, r2, 0x1, 0x0) 11:17:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000700)={0x53, 0x0, 0x3, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000540)="b342c2", 0x0, 0xfffffff8, 0x0, 0x0, 0x0}) 11:17:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) 11:17:13 executing program 3: r0 = memfd_create(&(0x7f0000000100)='+\x88\xc7s\x00\x00\x942nodev\x00\x00\x8cZ_Pv\x03\xa7\xc1\b\xec\x90Q\x85\x83\xcd\x16\xdcw\'\x8a\xe5N\x8c\x17\xfd\xc5\xad\xd5y\x15\x1fx\x17\f\xbc\xd1.\x8cA\x17\x86\xb7-j!Y\x92\xd9\xc4\r8\xd0\xc9X\xa7\x11\xa3\xf0\x8a*\xbc\x87\xcd\x1fl\xfc\xf3]\xb8\xbd\x02\v<\fl\xa6]\xa5\xfb\x05\xcb\x9c\xe2\xc8\x05\xa5\xa5\xeb\xa9\xef\xe3\xf1b\x81\xec\xac\xb6\x80\xd5\xf5S\x85\x06O\x05\xb8\xa1\x15\xcc\x17\xe8s\x95\x95B\xee_\x98\x91)\xe7\xa8+\x8c\xee\x83@q\x16\xcf3\x0f\x81\xa8\xa9`i\x01m:\xcc\x1c\xed<\xcfA3n\xfd\n>\x03\xae\f \xdbH\'\x05\x82\xdbLE\x14\xcdq\x1abcf\xdb8\xe9a\xa8\x00'/201, 0x2) fcntl$addseals(r0, 0x409, 0x12) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) [ 148.410968][ T25] audit: type=1326 audit(1620645433.245:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7268 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 148.436443][ T7342] loop1: detected capacity change from 0 to 264192 [ 148.449334][ T7342] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:13 executing program 0: clock_adjtime(0x0, &(0x7f00000004c0)={0xaaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x44cf, 0x0, 0x0, 0x3, 0x65, 0xfffffffffffffff9, 0x50000000000000, 0x8, 0x800, 0xeffffffffffffc5d, 0x4, 0x40, 0x5, 0x6, 0x1, 0x10001, 0x52b}) 11:17:13 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) unshare(0x20000400) ioctl$TCSBRKP(r0, 0x5425, 0x0) 11:17:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x101180) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$LOOP_GET_STATUS64(r0, 0x40081271, &(0x7f0000000000)) 11:17:13 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008064280008020100ac14141fbc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 148.590802][ T41] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:14 executing program 2: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @private=0xa010102}, {0x0, @link_local}, 0x6a, {0x2, 0x0, @loopback}, 'sit0\x00'}) write(0xffffffffffffffff, &(0x7f0000000200)="9c10ab00801ada2eb4ae3c532f9426afab26b49614db2b51017eee80170168d0d1326f10bacb2889a8018f7e233c7482c24641d22fd3a1e43ed8e8836701e9fc5f45c8558a1eac338b36f5e01dbe94b053548c68a8a44735c024e2141b1e2ffc9fd66410a27fa98735636c0aa8dc7d6a45b99404112b0ff78888fabbfebe7dee4b93265d22769619d1e0a29ef4603a560e14588256d015dcc5e57c53100bdfa22f", 0xa1) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000018c0)="1c0000001200050f0ca6760000ee53c6ce0ffb299d49b23e9b200a00089f36b878220724e59b4786e36bbe65d7b96e4161b0a242563fefdc437c632071d191cfe58d6875069935cbb3bf3dda5e55d1b6bcd38cab8bbb93ad3a31287b0f0af6e96ea1db4bd320d1b6857f884a5457716b3ba6e4e6b5aa629f2d678f53ad3fcb", 0x7f, 0x0, 0x0, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001640)={@private0, 0x800, 0x0, 0x2, 0xf, 0x4, 0x2}, 0x20) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0xfffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x20}, 0x1c) recvfrom$inet6(r4, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="9750757e6e", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 11:17:14 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400)=';', 0x1) write$P9_RREADLINK(r2, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) creat(&(0x7f00000000c0)='./bus\x00', 0x1b) 11:17:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'lo\x00', @ifru_flags}) 11:17:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dc", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 11:17:14 executing program 0: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000140)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560e, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)=0x0) timer_settime(r1, 0x0, &(0x7f00000002c0)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 11:17:14 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x108, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000780)={0x1, &(0x7f0000000600)=[{0x0, 0x29, &(0x7f0000000080)="a7cfe76114954b763cfe7440134c11cfc036b98c43c1c49e73b8d0db623b8a9b4826ccbba39cf8079e"}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 11:17:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r0, 0x0) readv(r2, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000200)=""/200, 0xc8}, {0x0}], 0x3) 11:17:14 executing program 3: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000000406010100000000000000000f00000a0900020073797a310000000009"], 0x6c}}, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c1e0309008000a000", 0x33a) [ 149.314892][ T25] audit: type=1326 audit(1620645434.145:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 149.337935][ T7407] loop1: detected capacity change from 0 to 264192 [ 149.348887][ T7407] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:17:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xffffffffffffff89}, {&(0x7f0000000240)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4ba7560f29500352543b498fcc", 0x85}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x3f) [ 149.391435][ T25] audit: type=1326 audit(1620645434.175:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=56 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 149.415895][ T25] audit: type=1326 audit(1620645434.175:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 11:17:14 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = dup2(r1, r0) r3 = syz_open_pts(r1, 0x2002) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "f286f58d180ed49c0e14f7ca911160b47f36ec"}) dup3(r3, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x6b}}) [ 149.440103][ T25] audit: type=1326 audit(1620645434.175:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=186 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 149.464237][ T25] audit: type=1326 audit(1620645434.175:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 11:17:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7bcbb6db8f92a8f00c0387"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x8000016, 0x0, 0x0, 0x0, 0x0, "2959f5f20fb8000000000f10e7ffffe10300"}) 11:17:14 executing program 1: sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private}, {0x8, 0x2, @multicast2}}}]}]}, 0x80}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) [ 149.488665][ T25] audit: type=1326 audit(1620645434.175:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7397 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=61 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 149.513370][ T25] audit: type=1326 audit(1620645434.175:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7410 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 149.578182][ T2357] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 149.589755][ T1343] ================================================================== [ 149.598138][ T1343] BUG: KCSAN: data-race in n_tty_receive_char_inline / n_tty_receive_char_special [ 149.607446][ T1343] [ 149.609778][ T1343] write to 0xffffc9000031d05d of 1 bytes by task 7438 on cpu 1: [ 149.617495][ T1343] n_tty_receive_char_special+0x21c7/0x3ac0 [ 149.623484][ T1343] n_tty_receive_buf_common+0x191c/0x1e20 [ 149.629558][ T1343] n_tty_receive_buf+0x2b/0x40 [ 149.634352][ T1343] tty_ioctl+0x968/0x1120 [ 149.638690][ T1343] __se_sys_ioctl+0xcb/0x140 [ 149.643291][ T1343] __x64_sys_ioctl+0x3f/0x50 [ 149.647897][ T1343] do_syscall_64+0x4a/0x90 [ 149.652313][ T1343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.658209][ T1343] [ 149.660538][ T1343] read to 0xffffc9000031d05d of 1 bytes by task 1343 on cpu 0: [ 149.668110][ T1343] n_tty_receive_char_inline+0x1c7/0x680 [ 149.674328][ T1343] n_tty_receive_buf_common+0x1893/0x1e20 [ 149.680664][ T1343] n_tty_receive_buf2+0x2e/0x40 [ 149.685563][ T1343] tty_ldisc_receive_buf+0x5b/0xf0 [ 149.690954][ T1343] tty_port_default_receive_buf+0x54/0x80 [ 149.697148][ T1343] flush_to_ldisc+0x1c5/0x2c0 [ 149.701921][ T1343] process_one_work+0x3e9/0x8f0 [ 149.707126][ T1343] worker_thread+0x636/0xae0 [ 149.712503][ T1343] kthread+0x1d0/0x1f0 [ 149.716744][ T1343] ret_from_fork+0x1f/0x30 [ 149.721443][ T1343] [ 149.723776][ T1343] Reported by Kernel Concurrency Sanitizer on: [ 149.730020][ T1343] CPU: 0 PID: 1343 Comm: kworker/u4:3 Not tainted 5.13.0-rc1-syzkaller #0 [ 149.738786][ T1343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.749146][ T1343] Workqueue: events_unbound flush_to_ldisc [ 149.754974][ T1343] ================================================================== 11:17:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = getpid() r1 = pidfd_open(r0, 0x0) pidfd_getfd(r1, r1, 0x0) 11:17:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000000, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xff, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x7}, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc", 0x2b1) sendfile(r1, r2, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) 11:17:15 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x80040, 0x0) r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r2) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x2000000) inotify_rm_watch(r2, r4) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000001180)) 11:17:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)={0x60002004}) epoll_wait(r1, &(0x7f00000000c0)=[{}, {}], 0x2, 0x0) 11:17:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x1000a882) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r1, r0, 0x0) 11:17:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000000c0)=0x37, 0x4) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 150.191547][ T7469] loop0: detected capacity change from 0 to 264192 11:17:15 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0x40286608, &(0x7f0000000280)) 11:17:15 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/198, 0xc6}], 0x3, 0x0, 0x0) clone(0x20002804ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 11:17:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x4}, 0x10) write(r0, &(0x7f0000000280)="2400000012005f0214f9f407000904080a0000000000000509000a0008001100fffff000", 0x24) 11:17:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x600, 0x2}, 0x20) 11:17:15 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/ipc\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x100016, 0x70, 0x0, {r0}}, 0x20) 11:17:15 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) mremap(&(0x7f0000e95000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000bff000/0x2000)=nil, 0x2000, 0x65) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$loop(0x0, 0x75f, 0x107382) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) 11:17:15 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="cc", 0x1}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:17:15 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) 11:17:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @remote}, @in6=@local}, {@in=@empty, 0x0, 0x6c}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 11:17:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000000, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xff, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x7}, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc", 0x2b1) sendfile(r1, r2, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) [ 150.365607][ T7505] EXT4-fs warning (device sda1): ext4_group_add:1667: No reserved GDT blocks, can't resize [ 150.387027][ T7506] EXT4-fs warning (device sda1): ext4_group_add:1667: No reserved GDT blocks, can't resize 11:17:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 11:17:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000ac0)=[{0x0}, {0x0, 0x2}, {&(0x7f00000009c0)=""/244, 0xf4}], 0x3}}], 0x2, 0x69c0455a7fff6d86, &(0x7f0000003e00)={0x77359400}) sendmsg$netlink(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000c40)={0x14, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 11:17:15 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0xc, 0x0) 11:17:15 executing program 3: setgid(0xffffffffffffffff) 11:17:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 11:17:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) io_setup(0x88, &(0x7f0000000440)=0x0) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000001140)={0x0, 0x0, 0x2, 0x1, 0x0, r0, 0x0}]) 11:17:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x1003, @empty=0xfe000000}, 0xc4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}) r1 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000100)) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000009c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001200)={&(0x7f0000000a00)={0x7f4, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x1bc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xdaec}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xac6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x6, 0x2, 0x2}, {0x2, 0xed, 0x0, 0x4}, {0x7f, 0x1, 0x9, 0x4}, {0x9, 0x20, 0x8, 0x4}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffe3b}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xb0}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xbd9}}}]}}]}, 0x7f4}, 0x1, 0x0, 0x0, 0x840}, 0x20000055) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1, @multicast1}, &(0x7f0000000340)=0xc) r4 = socket$packet(0x11, 0x3, 0x300) r5 = accept$packet(r4, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) accept4$packet(r5, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14, 0x80800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@private0, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private0}}, &(0x7f0000000600)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @local, @loopback}, &(0x7f0000000800)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000840)={@dev, 0x0}, &(0x7f0000000880)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000009c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001200)={&(0x7f0000000a00)={0x7f4, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x1bc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xdaec}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xac6}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x6, 0x2, 0x2}, {0x2, 0xed, 0x0, 0x4}, {0x7f, 0x1, 0x9, 0x4}, {0x9, 0x20, 0x8, 0x4}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r9}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffe3b}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r10}, {0x234, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xb0}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xbd9}}}]}}]}, 0x7f4}, 0x1, 0x0, 0x0, 0x840}, 0x20000055) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000440)={0x838, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [{{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8}, {0x1cc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x6, 0x3f, 0x5, 0x4}, {0x1, 0x3f, 0xfd, 0x9}, {0x7, 0x5d, 0x80, 0x400}, {0x1, 0x1, 0x38, 0x6}, {0xffff, 0x0, 0x3f, 0xff}, {0x7, 0x4, 0x7, 0x7}, {0x800, 0x0, 0xfa, 0x80000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x9, 0x65, 0x81, 0x3f}, {0x3f, 0xb2, 0x20, 0x1}]}}}]}}, {{0x8}, {0x90, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x26}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80c}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r12}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r13}}}]}}]}, 0x838}, 0x1, 0x0, 0x0, 0x6e}, 0x4000000) [ 150.562016][ T7545] loop0: detected capacity change from 0 to 264192 11:17:15 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 11:17:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x20012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000001140)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004103) 11:17:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8001}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 11:17:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x54, &(0x7f0000000140)="98a2cd9e00550f47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c32940a73e7f665b50b9a8d70f9345bd9707d6b2beb28e778c3b6d80a7683634d204584d022cb003e2ab4494ac642d8fc368fd"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:17:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000000, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xff, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x7}, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b1) sendfile(r1, r2, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) 11:17:15 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)=""/15, 0xf}], 0x1}, 0x0) set_mempolicy(0x1, &(0x7f00000001c0)=0x1, 0x83) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:17:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x66, 0xd9f, 0x0) tkill(0x0, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r2, 0x1) r3 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=@routing={0x3a, 0x4, 0x0, 0x5a, 0x0, [@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28) close(r2) [ 150.769570][ T7578] IPv4: Oversized IP packet from 127.0.0.1 [ 150.775658][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 150.802872][ T7578] IPv4: Oversized IP packet from 127.0.0.1 [ 150.802915][ C1] IPv4: Oversized IP packet from 127.0.0.1 11:17:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8001}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 11:17:15 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) setregid(0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 11:17:15 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2205, 0x0) [ 150.897243][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 150.911030][ T7607] IPv4: Oversized IP packet from 127.0.0.1 [ 150.916972][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 150.931607][ T7610] loop0: detected capacity change from 0 to 264192 [ 150.936151][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:17:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8001}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 11:17:15 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[], 0x1c) r2 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2286, 0x816d000) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0'}, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0x8000000000001000, 0x0, 0x0, 0x5}) 11:17:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x66, 0xd9f, 0x0) tkill(0x0, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r2, 0x1) r3 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=@routing={0x3a, 0x4, 0x0, 0x5a, 0x0, [@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28) close(r2) 11:17:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000340), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}}, 0x0) 11:17:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000100)={0x38, 0x1, 0x10000000, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0xff, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x7}, 0x0, 0xc, r0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b1) sendfile(r1, r2, 0x0, 0x1c500) ptrace$cont(0x18, 0x0, 0x0, 0x0) [ 151.107458][ T7635] IPv4: Oversized IP packet from 127.0.0.1 [ 151.113384][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 151.196443][ T7653] loop0: detected capacity change from 0 to 264192 11:17:18 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:17:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x66, 0xd9f, 0x0) tkill(0x0, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r2, 0x1) r3 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=@routing={0x3a, 0x4, 0x0, 0x5a, 0x0, [@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28) close(r2) 11:17:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8001}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x4, 0x4) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 11:17:18 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e1d, 0x0, @remote}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) 11:17:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000008c00)=[{{&(0x7f0000000040)=@ieee802154={0x24, @short}, 0x80, 0x0}}, {{&(0x7f0000000140)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)="eaa14d7dc0df4612a3fd5772060109947943c39f2b632bf9e5df8077ba8836", 0x5c9}, {&(0x7f0000000340)="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", 0x5aa}], 0x2}}], 0x2, 0x0) 11:17:18 executing program 2: r0 = fsopen(&(0x7f0000000040)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 11:17:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x66, 0xd9f, 0x0) tkill(0x0, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) shutdown(r2, 0x1) r3 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=@routing={0x3a, 0x4, 0x0, 0x5a, 0x0, [@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28) close(r2) 11:17:18 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="b3", 0x1}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 11:17:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800, 0xa3f2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ftruncate(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') 11:17:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8971, &(0x7f00000002c0)={'sit0\x00', 0x0}) 11:17:18 executing program 2: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r0, &(0x7f00000009c0)=[{{&(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000001c0)="5d357c788ff65bf4c6953ea1d8744e73cfcf8adbfbc6b9ae8a946d22e448f0a619e66f3574b86a8ba935c859b6267f8ba4e7e47c", 0x34}], 0x1}}], 0x1, 0x0) 11:17:18 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:17:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) writev(r1, &(0x7f00000014c0)=[{&(0x7f0000000300)="84", 0x1}], 0x1) 11:17:18 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x98, &(0x7f00000001c0)="98a2cd9e00550d47e89a1069878a23b50cec416dc81a234841c9c503b7ee9fb9c2c329a0dd395533073f28d64b66fe03006f224b8015e6665b50b9a8d70f9345bd9707d6b55e6cbaedf6dedea92a25cef8e07a0732896dc5ebd85b8f2f4b24fa34338ba332b2c4b561c48073a6b9c9907511700a2dd1d29dce590598624a5c10ab3e683397f8c3637a7cdfbf6ea145ca4c16b41d8b84c68c"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:17:18 executing program 4: get_robust_list(0xffffffffffffffff, 0x0, 0x0) 11:17:18 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x11, &(0x7f0000002080)=""/102393, &(0x7f0000000080)=0x18ff9) 11:17:18 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:17:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) shutdown(r0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x541000) 11:17:18 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='\xed\x8b\x8a\xb1\x81t g\xaaQQ\xf5\x10c\x9bF\xa9\x16\x11O\xdd\xdf\t(F\x99\xdf\x8c\xd5>oJ', 0x6) fcntl$addseals(r2, 0x409, 0x8) 11:17:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="b3", 0x1}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 11:17:19 executing program 2: socketpair(0x1, 0x802, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 11:17:19 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 11:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 11:17:19 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/current\x00') read$rfkill(r0, &(0x7f0000000080), 0x8) write$nbd(r0, 0x0, 0x0) 11:17:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190029c04800000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 11:17:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0x7, &(0x7f000002fff0), 0x0) pipe(0x0) 11:17:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) 11:17:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) [ 154.500992][ T7755] validate_nla: 1 callbacks suppressed [ 154.501005][ T7755] netlink: 'syz-executor.1': attribute type 41 has an invalid length. [ 154.515627][ T7754] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 154.528166][ T7754] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 11:17:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000000)={&(0x7f0000000040)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x10, 0x0, 0x1, {0x4, 0x1, 'snmp\x00'}}]}, 0x74}}, 0x0) 11:17:19 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe3b, &(0x7f0000000000)=[{&(0x7f00000000c0)="7fff000018007f5f14fe01b2a4a29093020604dffffffe060405040539000500350006080100000019000b40060c1001020022dc1338d54404139b84136ef75afb83de4411000500", 0xff72}, {&(0x7f0000000040)="73005000d612110000ff0ea988", 0xd}], 0x2}, 0x0) 11:17:19 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x440}, 0x18) unlink(&(0x7f0000000180)='./file0\x00') [ 154.557813][ T7754] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 154.605519][ T7765] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 154.640157][ T7777] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 154.668910][ T7783] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 154.677065][ T7783] __nla_validate_parse: 14 callbacks suppressed [ 154.677079][ T7783] netlink: 65319 bytes leftover after parsing attributes in process `syz-executor.2'. 11:17:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="b3", 0x1}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 11:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 11:17:19 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0xbfb, 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000000)=0x200, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/11, 0xb}}], 0x1, 0xfc00, 0x0) 11:17:19 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r1 = shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) shmdt(r1) 11:17:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000002c0)={[], [{@uid_eq={'uid', 0x3d, r0}}]}) 11:17:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000100)=""/230, 0xe6}, {&(0x7f0000000200)=""/92, 0x5c}, {&(0x7f0000000280)=""/228, 0xe4}, {&(0x7f00000003c0)=""/255, 0xff}], 0x4, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000400)) 11:17:19 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f0000000080)=')\x00', 0x2, 0x0) [ 154.942826][ T7803] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 154.952681][ T25] kauditd_printk_skb: 51 callbacks suppressed [ 154.952693][ T25] audit: type=1326 audit(1620645439.785:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 154.984750][ T7804] tmpfs: Bad value for 'uid' 11:17:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000300)={@multicast1, @local}, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mtu(r0, 0x0, 0x6, &(0x7f0000000040), 0x4) 11:17:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x40000) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11e1, 0x4) finit_module(r2, &(0x7f00000000c0)='/:+}---\x00', 0x2) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x2e0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4b, &(0x7f0000000180)=""/49) [ 154.985442][ T7808] autofs4:pid:7808:autofs_fill_super: called with bogus options [ 155.007589][ T7814] autofs4:pid:7814:autofs_fill_super: called with bogus options [ 155.029404][ T7803] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 11:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 11:17:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000200010000002000018008000300010000e0"], 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100007817) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:17:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000300)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001008000000000000b0000000004000008000000d2c2000012031d", 0x67, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 155.063569][ T25] audit: type=1326 audit(1620645439.785:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.089649][ T7823] SELinux: Context ) is not valid (left unmapped). [ 155.156011][ T7833] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 155.158612][ T25] audit: type=1326 audit(1620645439.785:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.200001][ T7839] loop5: detected capacity change from 0 to 4 [ 155.215695][ T7839] EXT4-fs (loop5): couldn't mount RDWR because of unsupported optional features (1d0000) [ 155.235070][ T25] audit: type=1326 audit(1620645439.785:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=30 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.259509][ T25] audit: type=1326 audit(1620645439.785:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.284635][ T25] audit: type=1326 audit(1620645439.785:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=67 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.309223][ T25] audit: type=1326 audit(1620645439.785:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.333394][ T25] audit: type=1326 audit(1620645439.785:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.358573][ T25] audit: type=1326 audit(1620645439.795:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 155.386912][ T7839] loop5: detected capacity change from 0 to 4 [ 155.394424][ T7839] EXT4-fs (loop5): couldn't mount RDWR because of unsupported optional features (1d0000) [ 155.408479][ T25] audit: type=1326 audit(1620645439.795:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7799 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=29 compat=0 ip=0x4665f9 code=0x7ffc0000 11:17:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000300)="b3", 0x1}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 11:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 11:17:20 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 11:17:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x3, 0x0, 0x1, 0x3, 0x0, 0x0, 0x59f}, 0x0) getpid() r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r4, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xee01}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:17:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000200010000002000018008000300010000e0"], 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100007817) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:17:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000480)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000380)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='rdma.current\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[], 0x208e24b) 11:17:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x30}}, 0x0) [ 155.858513][ T7880] loop5: detected capacity change from 0 to 4096 11:17:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x40000) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11e1, 0x4) finit_module(r2, &(0x7f00000000c0)='/:+}---\x00', 0x2) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x2e0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4b, &(0x7f0000000180)=""/49) 11:17:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000200010000002000018008000300010000e0"], 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100007817) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:17:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff70880000800328000400010001010200bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 155.937148][ T7877] loop1: detected capacity change from 0 to 6 [ 155.959146][ T7880] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 11:17:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000e00)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20020080, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 11:17:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x11, 0x800000003, 0x81) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$IPC_RMID(r0, 0x0) [ 156.036701][ T7877] FAT-fs (loop1): Directory bread(block 6) failed [ 156.085305][ T7906] netlink: 4864 bytes leftover after parsing attributes in process `syz-executor.4'. 11:17:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000200010000002000018008000300010000e0"], 0x3c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100007817) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:17:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x11, 0x800000003, 0x81) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$IPC_RMID(r0, 0x0) 11:17:21 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='tmpfs\x00', 0x0, &(0x7f0000000040)='gid=ignore\xa0\x83X3\x1a\xfd\xc0\xafN\x1a\x7fqv\xed\xbe`\xdb&P\x9cF\xf5\xe2\xbf\xc5CxH0\xc4\xa4F$\bSQ7?\x1fc\x95j,\xbd\xa6\xd4\xbbt\xaf\xe1\v\xce\xfe\x1d\xb5\x1d\x00\xc0\x10\xdd\xa3\x13\xb1\xfb\xbd`\xb3\xd7\xb3\xf11?\xc2$\x8f\x90\xb0\x1a\n\a/\f\x8djk\x95\xd8\xd7\x95\xa0\xf5\xb1\f\x97\xb48\xe8\xc2F\x95\x88\x05Z\xd9DJO\xed\xf7\xf7\xab\x18\xb4') 11:17:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x3, 0x0, 0x1, 0x3, 0x0, 0x0, 0x59f}, 0x0) getpid() r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r4, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xee01}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:17:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@flowinfo={{0x12, 0x11, 0x67}}], 0x18}, 0x0) 11:17:21 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='tmpfs\x00', 0x0, &(0x7f0000000040)='gid=ignore\xa0\x83X3\x1a\xfd\xc0\xafN\x1a\x7fqv\xed\xbe`\xdb&P\x9cF\xf5\xe2\xbf\xc5CxH0\xc4\xa4F$\bSQ7?\x1fc\x95j,\xbd\xa6\xd4\xbbt\xaf\xe1\v\xce\xfe\x1d\xb5\x1d\x00\xc0\x10\xdd\xa3\x13\xb1\xfb\xbd`\xb3\xd7\xb3\xf11?\xc2$\x8f\x90\xb0\x1a\n\a/\f\x8djk\x95\xd8\xd7\x95\xa0\xf5\xb1\f\x97\xb48\xe8\xc2F\x95\x88\x05Z\xd9DJO\xed\xf7\xf7\xab\x18\xb4') [ 156.552169][ T7937] tmpfs: Bad value for 'gid' 11:17:21 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='tmpfs\x00', 0x0, &(0x7f0000000040)='gid=ignore\xa0\x83X3\x1a\xfd\xc0\xafN\x1a\x7fqv\xed\xbe`\xdb&P\x9cF\xf5\xe2\xbf\xc5CxH0\xc4\xa4F$\bSQ7?\x1fc\x95j,\xbd\xa6\xd4\xbbt\xaf\xe1\v\xce\xfe\x1d\xb5\x1d\x00\xc0\x10\xdd\xa3\x13\xb1\xfb\xbd`\xb3\xd7\xb3\xf11?\xc2$\x8f\x90\xb0\x1a\n\a/\f\x8djk\x95\xd8\xd7\x95\xa0\xf5\xb1\f\x97\xb48\xe8\xc2F\x95\x88\x05Z\xd9DJO\xed\xf7\xf7\xab\x18\xb4') [ 156.615943][ T7953] tmpfs: Bad value for 'gid' [ 156.664461][ T7963] tmpfs: Bad value for 'gid' 11:17:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x11, 0x800000003, 0x81) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$IPC_RMID(r0, 0x0) 11:17:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7d, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 11:17:21 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='tmpfs\x00', 0x0, &(0x7f0000000040)='gid=ignore\xa0\x83X3\x1a\xfd\xc0\xafN\x1a\x7fqv\xed\xbe`\xdb&P\x9cF\xf5\xe2\xbf\xc5CxH0\xc4\xa4F$\bSQ7?\x1fc\x95j,\xbd\xa6\xd4\xbbt\xaf\xe1\v\xce\xfe\x1d\xb5\x1d\x00\xc0\x10\xdd\xa3\x13\xb1\xfb\xbd`\xb3\xd7\xb3\xf11?\xc2$\x8f\x90\xb0\x1a\n\a/\f\x8djk\x95\xd8\xd7\x95\xa0\xf5\xb1\f\x97\xb48\xe8\xc2F\x95\x88\x05Z\xd9DJO\xed\xf7\xf7\xab\x18\xb4') 11:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x40000) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11e1, 0x4) finit_module(r2, &(0x7f00000000c0)='/:+}---\x00', 0x2) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x2e0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4b, &(0x7f0000000180)=""/49) 11:17:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000080)=0x20, 0x4) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x10000) [ 156.936292][ T7967] loop5: detected capacity change from 0 to 4096 [ 156.949058][ T7967] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 156.972975][ T7981] tmpfs: Bad value for 'gid' 11:17:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000640)="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", 0x39e}], 0x1) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 11:17:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket(0x11, 0x800000003, 0x81) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$IPC_RMID(r0, 0x0) 11:17:21 executing program 3: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000000c0)='&', 0x1) 11:17:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x3, 0x0, 0x1, 0x3, 0x0, 0x0, 0x59f}, 0x0) getpid() r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r4, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xee01}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:17:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0xa0000804) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) 11:17:22 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc) 11:17:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000140)=@ethtool_ts_info}) 11:17:22 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r2 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r2, 0x1) io_uring_enter(r0, 0x780c, 0x0, 0x0, 0x0, 0x0) 11:17:22 executing program 1: perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:17:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, 0x0, 0x40000) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x11e1, 0x4) finit_module(r2, &(0x7f00000000c0)='/:+}---\x00', 0x2) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x2e0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4b, &(0x7f0000000180)=""/49) 11:17:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x0) [ 157.691715][ T8034] loop5: detected capacity change from 0 to 4096 [ 157.704324][ T8034] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 11:17:22 executing program 1: perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:17:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5456, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a49d305f5ccb0dad5e54161a75676e581e501f"}) 11:17:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4a, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 11:17:22 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x80c2}, 0x18) r3 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x10b041}, 0x18) pwritev2(r3, &(0x7f0000000100)=[{&(0x7f0000000140)="b2", 0x1}, {&(0x7f00000003c0)='.', 0x1}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000001440)=[{&(0x7f0000000280)="8a", 0x1}], 0x1, 0x0) splice(r2, 0x0, r1, 0x0, 0x2000004, 0x0) 11:17:23 executing program 1: perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:17:23 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2011, r0, 0x0) 11:17:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) tkill(0x0, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x3, 0x0, 0x1, 0x3, 0x0, 0x0, 0x59f}, 0x0) getpid() r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}], 0x0, &(0x7f00000000c0)=ANY=[]) fchown(r4, 0x0, 0xffffffffffffffff) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0xee01}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:17:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)={0x60, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x60}}, 0x0) 11:17:23 executing program 2: r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x5, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000c85000)={0xa000201a}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 11:17:23 executing program 1: perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:17:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x11, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 11:17:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x12, &(0x7f0000000040)="be1ec334", 0x4) 11:17:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f00000002c0)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004b9d63cc1bd1558", 0x24, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 11:17:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b144b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef73d9125939f50bd2d4ed96a074eb04a348a666bf48b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a7038d36bf8faef497d5a7f37b117c238d1d8f1762c6716ac84638e03a827345e3cdbc550a8002bb22f191969e2fe440b20ea32b5", 0xea}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x2d) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 158.606275][ T8119] loop2: detected capacity change from 0 to 512 [ 158.679617][ T8120] loop5: detected capacity change from 0 to 4096 [ 158.696371][ T8120] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 158.772823][ T8119] loop2: detected capacity change from 0 to 512 [ 158.782188][ T8119] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: casefold flag without casefold feature [ 158.795822][ T8119] EXT4-fs (loop2): warning: mounting fs with errors, running e2fsck is recommended [ 158.806103][ T8119] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none.