[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. 2021/05/21 14:33:54 fuzzer started 2021/05/21 14:33:54 dialing manager at 10.128.0.163:40479 2021/05/21 14:33:56 syscalls: 1997 2021/05/21 14:33:56 code coverage: enabled 2021/05/21 14:33:56 comparison tracing: enabled 2021/05/21 14:33:56 extra coverage: enabled 2021/05/21 14:33:56 setuid sandbox: enabled 2021/05/21 14:33:56 namespace sandbox: enabled 2021/05/21 14:33:56 Android sandbox: enabled 2021/05/21 14:33:56 fault injection: enabled 2021/05/21 14:33:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/21 14:33:56 net packet injection: /dev/net/tun does not exist 2021/05/21 14:33:56 net device setup: enabled 2021/05/21 14:33:56 concurrency sanitizer: enabled 2021/05/21 14:33:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/21 14:33:56 USB emulation: /dev/raw-gadget does not exist 2021/05/21 14:33:56 hci packet injection: /dev/vhci does not exist 2021/05/21 14:33:56 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/05/21 14:33:56 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/05/21 14:33:57 suppressing KCSAN reports in functions: 'kauditd_thread' '__writeback_single_inode' '__ext4_new_inode' 'xas_clear_mark' 'audit_log_start' 'step_into' 'lookup_fast' 'do_nanosleep' 'alloc_pid' 'blk_mq_sched_dispatch_requests' 'do_signal_stop' 'handle_irq_event' 'do_sys_poll' 'generic_write_end' 'shmem_mknod' 'blk_mq_rq_ctx_init' 'dd_has_work' 'ext4_alloc_da_blocks' '__xa_clear_mark' 'blk_mq_dispatch_rq_list' '_find_next_bit' 'futex_wait_queue_me' 'd_alloc_parallel' 'exit_mm' 2021/05/21 14:33:57 fetching corpus: 0, signal 0/2000 (executing program) 2021/05/21 14:33:57 fetching corpus: 44, signal 18316/21932 (executing program) 2021/05/21 14:33:57 fetching corpus: 94, signal 25137/30281 (executing program) 2021/05/21 14:33:57 fetching corpus: 144, signal 32893/39405 (executing program) 2021/05/21 14:33:58 fetching corpus: 192, signal 36805/44794 (executing program) 2021/05/21 14:33:58 fetching corpus: 242, signal 40053/49407 (executing program) 2021/05/21 14:33:58 fetching corpus: 292, signal 43649/54286 (executing program) 2021/05/21 14:33:58 fetching corpus: 341, signal 47060/58899 (executing program) 2021/05/21 14:33:58 fetching corpus: 391, signal 51738/64610 (executing program) 2021/05/21 14:33:58 fetching corpus: 441, signal 53551/67666 (executing program) 2021/05/21 14:33:58 fetching corpus: 490, signal 57741/72775 (executing program) 2021/05/21 14:33:58 fetching corpus: 540, signal 60358/76414 (executing program) 2021/05/21 14:33:58 fetching corpus: 590, signal 63415/80374 (executing program) 2021/05/21 14:33:58 fetching corpus: 639, signal 65347/83324 (executing program) 2021/05/21 14:33:58 fetching corpus: 689, signal 66869/85845 (executing program) 2021/05/21 14:33:58 fetching corpus: 738, signal 68902/88782 (executing program) 2021/05/21 14:33:58 fetching corpus: 788, signal 71218/91936 (executing program) 2021/05/21 14:33:58 fetching corpus: 836, signal 73361/94931 (executing program) 2021/05/21 14:33:59 fetching corpus: 886, signal 75013/97458 (executing program) 2021/05/21 14:33:59 fetching corpus: 936, signal 76701/99966 (executing program) 2021/05/21 14:33:59 fetching corpus: 986, signal 78756/102748 (executing program) 2021/05/21 14:33:59 fetching corpus: 1036, signal 80153/105040 (executing program) 2021/05/21 14:33:59 fetching corpus: 1086, signal 81672/107373 (executing program) 2021/05/21 14:33:59 fetching corpus: 1136, signal 82790/109339 (executing program) 2021/05/21 14:33:59 fetching corpus: 1185, signal 83712/111116 (executing program) 2021/05/21 14:33:59 fetching corpus: 1235, signal 85978/113865 (executing program) 2021/05/21 14:33:59 fetching corpus: 1283, signal 87320/115874 (executing program) 2021/05/21 14:33:59 fetching corpus: 1330, signal 88984/118094 (executing program) 2021/05/21 14:33:59 fetching corpus: 1379, signal 90012/119846 (executing program) 2021/05/21 14:33:59 fetching corpus: 1429, signal 91973/122205 (executing program) 2021/05/21 14:33:59 fetching corpus: 1479, signal 93150/123956 (executing program) 2021/05/21 14:34:00 fetching corpus: 1528, signal 94157/125595 (executing program) 2021/05/21 14:34:00 fetching corpus: 1578, signal 95516/127439 (executing program) 2021/05/21 14:34:00 fetching corpus: 1628, signal 97504/129698 (executing program) 2021/05/21 14:34:00 fetching corpus: 1678, signal 98618/131330 (executing program) 2021/05/21 14:34:00 fetching corpus: 1728, signal 99734/132950 (executing program) 2021/05/21 14:34:00 fetching corpus: 1778, signal 101219/134731 (executing program) 2021/05/21 14:34:00 fetching corpus: 1828, signal 102055/136153 (executing program) 2021/05/21 14:34:00 fetching corpus: 1878, signal 103075/137602 (executing program) 2021/05/21 14:34:00 fetching corpus: 1927, signal 104634/139354 (executing program) 2021/05/21 14:34:00 fetching corpus: 1977, signal 105682/140828 (executing program) 2021/05/21 14:34:00 fetching corpus: 2027, signal 106947/142366 (executing program) 2021/05/21 14:34:01 fetching corpus: 2077, signal 107866/143694 (executing program) 2021/05/21 14:34:01 fetching corpus: 2126, signal 108449/144895 (executing program) 2021/05/21 14:34:01 fetching corpus: 2175, signal 109021/146061 (executing program) 2021/05/21 14:34:01 fetching corpus: 2224, signal 110194/147487 (executing program) 2021/05/21 14:34:01 fetching corpus: 2274, signal 111510/148935 (executing program) 2021/05/21 14:34:01 fetching corpus: 2323, signal 112278/150086 (executing program) 2021/05/21 14:34:01 fetching corpus: 2372, signal 114438/151890 (executing program) 2021/05/21 14:34:01 fetching corpus: 2422, signal 115424/153108 (executing program) 2021/05/21 14:34:01 fetching corpus: 2472, signal 116233/154236 (executing program) 2021/05/21 14:34:01 fetching corpus: 2522, signal 117842/155693 (executing program) 2021/05/21 14:34:01 fetching corpus: 2571, signal 118911/156823 (executing program) 2021/05/21 14:34:01 fetching corpus: 2621, signal 120076/158021 (executing program) 2021/05/21 14:34:01 fetching corpus: 2671, signal 120609/158948 (executing program) 2021/05/21 14:34:01 fetching corpus: 2720, signal 121100/159879 (executing program) 2021/05/21 14:34:01 fetching corpus: 2770, signal 121627/160783 (executing program) 2021/05/21 14:34:02 fetching corpus: 2820, signal 122610/161816 (executing program) 2021/05/21 14:34:02 fetching corpus: 2869, signal 123387/162824 (executing program) 2021/05/21 14:34:02 fetching corpus: 2919, signal 124085/163785 (executing program) 2021/05/21 14:34:02 fetching corpus: 2969, signal 124789/164650 (executing program) 2021/05/21 14:34:02 fetching corpus: 3019, signal 125664/165558 (executing program) 2021/05/21 14:34:02 fetching corpus: 3069, signal 126114/166357 (executing program) 2021/05/21 14:34:02 fetching corpus: 3119, signal 126821/167237 (executing program) 2021/05/21 14:34:02 fetching corpus: 3169, signal 127538/168018 (executing program) 2021/05/21 14:34:02 fetching corpus: 3218, signal 128140/168839 (executing program) 2021/05/21 14:34:02 fetching corpus: 3268, signal 128621/169633 (executing program) 2021/05/21 14:34:02 fetching corpus: 3318, signal 129162/170436 (executing program) 2021/05/21 14:34:02 fetching corpus: 3368, signal 129669/171186 (executing program) 2021/05/21 14:34:03 fetching corpus: 3418, signal 130183/171936 (executing program) 2021/05/21 14:34:03 fetching corpus: 3468, signal 131229/172731 (executing program) 2021/05/21 14:34:03 fetching corpus: 3517, signal 131754/173448 (executing program) 2021/05/21 14:34:03 fetching corpus: 3567, signal 132315/174180 (executing program) 2021/05/21 14:34:03 fetching corpus: 3617, signal 132826/174784 (executing program) 2021/05/21 14:34:03 fetching corpus: 3667, signal 133550/175574 (executing program) 2021/05/21 14:34:03 fetching corpus: 3717, signal 134208/176263 (executing program) 2021/05/21 14:34:03 fetching corpus: 3767, signal 134603/176872 (executing program) 2021/05/21 14:34:03 fetching corpus: 3817, signal 135750/177670 (executing program) 2021/05/21 14:34:03 fetching corpus: 3867, signal 136375/178332 (executing program) 2021/05/21 14:34:03 fetching corpus: 3917, signal 137067/178940 (executing program) 2021/05/21 14:34:03 fetching corpus: 3967, signal 138671/179643 (executing program) 2021/05/21 14:34:03 fetching corpus: 4017, signal 139118/180152 (executing program) 2021/05/21 14:34:04 fetching corpus: 4067, signal 139686/180722 (executing program) 2021/05/21 14:34:04 fetching corpus: 4117, signal 140526/181299 (executing program) 2021/05/21 14:34:04 fetching corpus: 4167, signal 141348/181897 (executing program) 2021/05/21 14:34:04 fetching corpus: 4217, signal 141840/182422 (executing program) 2021/05/21 14:34:04 fetching corpus: 4267, signal 142509/182937 (executing program) 2021/05/21 14:34:04 fetching corpus: 4317, signal 143213/183434 (executing program) 2021/05/21 14:34:04 fetching corpus: 4367, signal 143943/183946 (executing program) 2021/05/21 14:34:04 fetching corpus: 4417, signal 145190/184447 (executing program) 2021/05/21 14:34:04 fetching corpus: 4467, signal 145626/184916 (executing program) 2021/05/21 14:34:04 fetching corpus: 4517, signal 146113/185322 (executing program) 2021/05/21 14:34:04 fetching corpus: 4567, signal 146937/185638 (executing program) 2021/05/21 14:34:04 fetching corpus: 4617, signal 147447/185638 (executing program) 2021/05/21 14:34:04 fetching corpus: 4667, signal 148373/185638 (executing program) 2021/05/21 14:34:05 fetching corpus: 4717, signal 148677/185646 (executing program) 2021/05/21 14:34:05 fetching corpus: 4767, signal 149370/185646 (executing program) 2021/05/21 14:34:05 fetching corpus: 4815, signal 149965/185656 (executing program) 2021/05/21 14:34:05 fetching corpus: 4865, signal 150603/185656 (executing program) 2021/05/21 14:34:05 fetching corpus: 4915, signal 151123/185657 (executing program) 2021/05/21 14:34:05 fetching corpus: 4965, signal 151534/185658 (executing program) 2021/05/21 14:34:05 fetching corpus: 5015, signal 151897/185658 (executing program) 2021/05/21 14:34:05 fetching corpus: 5065, signal 152350/185658 (executing program) 2021/05/21 14:34:05 fetching corpus: 5115, signal 153056/185681 (executing program) 2021/05/21 14:34:05 fetching corpus: 5165, signal 153464/185681 (executing program) 2021/05/21 14:34:05 fetching corpus: 5215, signal 154006/185681 (executing program) 2021/05/21 14:34:05 fetching corpus: 5265, signal 154442/185681 (executing program) 2021/05/21 14:34:05 fetching corpus: 5314, signal 154881/185681 (executing program) 2021/05/21 14:34:05 fetching corpus: 5364, signal 155384/185681 (executing program) 2021/05/21 14:34:06 fetching corpus: 5414, signal 155719/185683 (executing program) 2021/05/21 14:34:06 fetching corpus: 5464, signal 156090/185683 (executing program) 2021/05/21 14:34:06 fetching corpus: 5514, signal 156580/185697 (executing program) 2021/05/21 14:34:06 fetching corpus: 5564, signal 157021/185697 (executing program) 2021/05/21 14:34:06 fetching corpus: 5614, signal 157649/185697 (executing program) 2021/05/21 14:34:06 fetching corpus: 5664, signal 158170/185699 (executing program) 2021/05/21 14:34:06 fetching corpus: 5714, signal 158487/185699 (executing program) 2021/05/21 14:34:06 fetching corpus: 5764, signal 158986/185699 (executing program) 2021/05/21 14:34:06 fetching corpus: 5812, signal 159431/185720 (executing program) 2021/05/21 14:34:06 fetching corpus: 5862, signal 160054/185720 (executing program) 2021/05/21 14:34:06 fetching corpus: 5912, signal 160351/185720 (executing program) 2021/05/21 14:34:06 fetching corpus: 5962, signal 160736/185735 (executing program) 2021/05/21 14:34:06 fetching corpus: 6012, signal 161027/185736 (executing program) 2021/05/21 14:34:06 fetching corpus: 6062, signal 161522/185736 (executing program) 2021/05/21 14:34:06 fetching corpus: 6112, signal 162086/185737 (executing program) 2021/05/21 14:34:06 fetching corpus: 6162, signal 162547/185737 (executing program) 2021/05/21 14:34:07 fetching corpus: 6211, signal 162921/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6261, signal 163613/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6311, signal 163977/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6361, signal 164954/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6411, signal 165357/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6461, signal 165765/185748 (executing program) 2021/05/21 14:34:07 fetching corpus: 6511, signal 166480/185750 (executing program) 2021/05/21 14:34:07 fetching corpus: 6561, signal 166795/185750 (executing program) 2021/05/21 14:34:07 fetching corpus: 6610, signal 167125/185751 (executing program) 2021/05/21 14:34:07 fetching corpus: 6660, signal 167521/185751 (executing program) 2021/05/21 14:34:07 fetching corpus: 6710, signal 168355/185751 (executing program) 2021/05/21 14:34:07 fetching corpus: 6760, signal 168759/185754 (executing program) 2021/05/21 14:34:07 fetching corpus: 6810, signal 169260/185762 (executing program) 2021/05/21 14:34:07 fetching corpus: 6860, signal 169590/185762 (executing program) 2021/05/21 14:34:07 fetching corpus: 6910, signal 170263/185762 (executing program) 2021/05/21 14:34:08 fetching corpus: 6960, signal 170644/185762 (executing program) 2021/05/21 14:34:08 fetching corpus: 7010, signal 171105/185766 (executing program) 2021/05/21 14:34:08 fetching corpus: 7060, signal 171567/185766 (executing program) 2021/05/21 14:34:08 fetching corpus: 7110, signal 171889/185780 (executing program) 2021/05/21 14:34:08 fetching corpus: 7160, signal 172305/185780 (executing program) 2021/05/21 14:34:08 fetching corpus: 7210, signal 172947/185780 (executing program) 2021/05/21 14:34:08 fetching corpus: 7259, signal 173533/185780 (executing program) 2021/05/21 14:34:08 fetching corpus: 7309, signal 173884/185806 (executing program) 2021/05/21 14:34:08 fetching corpus: 7358, signal 174283/185806 (executing program) 2021/05/21 14:34:08 fetching corpus: 7408, signal 174625/185808 (executing program) 2021/05/21 14:34:08 fetching corpus: 7458, signal 174925/185808 (executing program) 2021/05/21 14:34:08 fetching corpus: 7508, signal 175270/185808 (executing program) 2021/05/21 14:34:08 fetching corpus: 7558, signal 175696/185808 (executing program) 2021/05/21 14:34:08 fetching corpus: 7608, signal 176042/185808 (executing program) 2021/05/21 14:34:08 fetching corpus: 7658, signal 176303/185808 (executing program) 2021/05/21 14:34:09 fetching corpus: 7708, signal 176696/185808 (executing program) 2021/05/21 14:34:09 fetching corpus: 7758, signal 177253/185808 (executing program) 2021/05/21 14:34:09 fetching corpus: 7808, signal 177615/185810 (executing program) 2021/05/21 14:34:09 fetching corpus: 7858, signal 177851/185810 (executing program) 2021/05/21 14:34:09 fetching corpus: 7908, signal 178192/185810 (executing program) 2021/05/21 14:34:09 fetching corpus: 7958, signal 178491/185810 (executing program) 2021/05/21 14:34:09 fetching corpus: 8008, signal 178813/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8058, signal 179179/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8108, signal 179595/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8158, signal 179934/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8208, signal 180485/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8258, signal 180976/185817 (executing program) 2021/05/21 14:34:09 fetching corpus: 8308, signal 181249/185826 (executing program) 2021/05/21 14:34:09 fetching corpus: 8358, signal 181582/185826 (executing program) 2021/05/21 14:34:09 fetching corpus: 8406, signal 181861/185830 (executing program) 2021/05/21 14:34:10 fetching corpus: 8456, signal 182157/185833 (executing program) 2021/05/21 14:34:10 fetching corpus: 8506, signal 182551/185833 (executing program) 2021/05/21 14:34:10 fetching corpus: 8556, signal 182820/185833 (executing program) 2021/05/21 14:34:10 fetching corpus: 8606, signal 183169/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8655, signal 183416/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8705, signal 183715/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8755, signal 184007/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8805, signal 184505/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8838, signal 184668/185843 (executing program) 2021/05/21 14:34:10 fetching corpus: 8838, signal 184668/185843 (executing program) 2021/05/21 14:34:11 starting 6 fuzzer processes 14:34:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x541b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) 14:34:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000280)=0x3, 0x4) 14:34:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:11 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x50, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:34:11 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x811000, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x30100a4, &(0x7f0000000100)={[{@journal_async_commit}, {@nouser_xattr}]}) 14:34:11 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="e4dd841c12f651d20cf01238aff2198956955c4723c354f75733bfa45d3c47b5fc977119b5816bce7e7d85e87187e74f7fa498092575dbaffc313b9e6ef6d78e68c3c9050000000caf844c183dff77644cfcf59cc6d108a38a523d9dcd1f421b473c8ce2a4f5a98cd38ecdae5fdd0125bc073b85bf31cd2f10ec8578c13aec83c23cc78df02ba3dc4e6b15813d4af15715012cdb581046b50e8c6ffcaacf08f31fa1d3b9e8c22e356b7aa512d19fb9c274425adac9129e69b65171ec58506177a7d35ecfd8a6458b48f1fbf4dd6d0114", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) syzkaller login: [ 35.285495][ T22] audit: type=1400 audit(1621607651.909:8): avc: denied { execmem } for pid=1786 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 35.377020][ T1793] cgroup: Unknown subsys name 'perf_event' [ 35.383415][ T1794] cgroup: Unknown subsys name 'perf_event' [ 35.389791][ T1794] cgroup: Unknown subsys name 'net_cls' [ 35.402536][ T1793] cgroup: Unknown subsys name 'net_cls' [ 35.426185][ T1797] cgroup: Unknown subsys name 'perf_event' [ 35.435557][ T1797] cgroup: Unknown subsys name 'net_cls' [ 35.448951][ T1798] cgroup: Unknown subsys name 'perf_event' [ 35.455331][ T1799] cgroup: Unknown subsys name 'perf_event' [ 35.455958][ T1801] cgroup: Unknown subsys name 'perf_event' [ 35.461922][ T1798] cgroup: Unknown subsys name 'net_cls' [ 35.467717][ T1801] cgroup: Unknown subsys name 'net_cls' [ 35.473770][ T1799] cgroup: Unknown subsys name 'net_cls' 14:34:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="e4dd841c12f651d20cf01238aff2198956955c4723c354f75733bfa45d3c47b5fc977119b5816bce7e7d85e87187e74f7fa498092575dbaffc313b9e6ef6d78e68c3c9050000000caf844c183dff77644cfcf59cc6d108a38a523d9dcd1f421b473c8ce2a4f5a98cd38ecdae5fdd0125bc073b85bf31cd2f10ec8578c13aec83c23cc78df02ba3dc4e6b15813d4af15715012cdb581046b50e8c6ffcaacf08f31fa1d3b9e8c22e356b7aa512d19fb9c274425adac9129e69b65171ec58506177a7d35ecfd8a6458b48f1fbf4dd6d0114", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:34:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000280)=0x3, 0x4) 14:34:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000280)=0x3, 0x4) 14:34:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000280)=0x3, 0x4) [ 39.324900][ T4508] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 39.324900][ T4508] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 39.324900][ T4508] [ 39.343407][ T4508] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 39.437689][ T4508] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit,nouser_xattr,,errors=continue. Quota mode: none. [ 39.463965][ T4557] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 39.463965][ T4557] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 39.463965][ T4557] [ 39.482241][ T4557] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 39.498895][ T4557] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit,nouser_xattr,,errors=continue. Quota mode: none. 14:34:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x541b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) 14:34:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:16 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:16 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8500}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x107382) syncfs(r0) r1 = memfd_create(&(0x7f0000000080)='.><\b\x00\x00\x00\x00\x00\n\xc5R\x80\xfa\xcb2h\xb8\x89\x9eJ\x9b^\x1e\xa0w\x0e\xb3j1\\\x10\xa0\x04>\xbaa\x84)]~F\x88\x9a\xc2n\xb5\x0f\xf8~\x98\x8f\xf4\xa4n\x94\xd6\xfb\xa1\xbc\xf8i\x8fz:\x10\x1f\x92*\x97\xdac\x1fT\xb3\xf5\x14\xe9\xd0J2N3\x97Q\a\xfa\x91A\xf4\"\xc4\x1d\xb1\xaem\x98l\xdd\xfd3\t\x1e\xd0i2m\xbaL_\xf5\x9dw\x13\x83\xe5\x8d\x1f?\x06\xbc1.\xb1\t\xd1\x0f\xb75\xde\xc2\x7fI\xe5\xadO\x86a[\xcb\xdey<)1\xf3\xa3u\\\xfc\x14\xe7$\xca\xe7\xb0\xbb\xb9\xc8\x02\x1e\xc7u\xd6s\xd0\x91\x8fc\xd6\xa5GW\x8b\xad3D[\x9f\x93O\xbe\a\xa4\xaa;\xd6\x8b\xc6{\x9b\xb2\x04\xeb\xb0i^Z\x80\xe2\r2)=\x83\x12*t', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r2, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x10500, 0x0) sendfile(r0, r0, 0x0, 0x24002da8) 14:34:16 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x811000, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x30100a4, &(0x7f0000000100)={[{@journal_async_commit}, {@nouser_xattr}]}) 14:34:16 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) [ 40.183870][ T4578] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 40.183870][ T4578] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 40.183870][ T4578] [ 40.202146][ T4578] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 40.220726][ T4578] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit,nouser_xattr,,errors=continue. Quota mode: none. 14:34:18 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="e4dd841c12f651d20cf01238aff2198956955c4723c354f75733bfa45d3c47b5fc977119b5816bce7e7d85e87187e74f7fa498092575dbaffc313b9e6ef6d78e68c3c9050000000caf844c183dff77644cfcf59cc6d108a38a523d9dcd1f421b473c8ce2a4f5a98cd38ecdae5fdd0125bc073b85bf31cd2f10ec8578c13aec83c23cc78df02ba3dc4e6b15813d4af15715012cdb581046b50e8c6ffcaacf08f31fa1d3b9e8c22e356b7aa512d19fb9c274425adac9129e69b65171ec58506177a7d35ecfd8a6458b48f1fbf4dd6d0114", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:34:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300430, &(0x7f0000001640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37]}}]}) 14:34:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:34:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) lseek(r0, 0x5, 0x0) lseek(r0, 0xe5c2, 0x0) 14:34:18 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x811000, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x30100a4, &(0x7f0000000100)={[{@journal_async_commit}, {@nouser_xattr}]}) 14:34:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x541b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) 14:34:18 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300430, &(0x7f0000001640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37]}}]}) 14:34:18 executing program 5: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 14:34:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x811000, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x30100a4, &(0x7f0000000100)={[{@journal_async_commit}, {@nouser_xattr}]}) [ 42.333318][ T4609] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 42.333318][ T4609] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 42.333318][ T4609] 14:34:19 executing program 5: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 14:34:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300430, &(0x7f0000001640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37]}}]}) 14:34:19 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:34:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="e4dd841c12f651d20cf01238aff2198956955c4723c354f75733bfa45d3c47b5fc977119b5816bce7e7d85e87187e74f7fa498092575dbaffc313b9e6ef6d78e68c3c9050000000caf844c183dff77644cfcf59cc6d108a38a523d9dcd1f421b473c8ce2a4f5a98cd38ecdae5fdd0125bc073b85bf31cd2f10ec8578c13aec83c23cc78df02ba3dc4e6b15813d4af15715012cdb581046b50e8c6ffcaacf08f31fa1d3b9e8c22e356b7aa512d19fb9c274425adac9129e69b65171ec58506177a7d35ecfd8a6458b48f1fbf4dd6d0114", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 14:34:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:21 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300430, &(0x7f0000001640)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37]}}]}) 14:34:21 executing program 5: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 14:34:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x541b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) 14:34:21 executing program 2: r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x70, 0xcf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t\t>6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) 14:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:22 executing program 5: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 14:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8", 0x24}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:34:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 14:34:24 executing program 2: r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x70, 0xcf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t\t>6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) 14:34:24 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) 14:34:24 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x40000004}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 14:34:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000101010200000000000f00000a0000000c001980080002c0"], 0x24}}, 0x0) 14:34:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9d80}], 0x2d, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/43, 0x2b}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 48.356093][ T22] audit: type=1326 audit(1621607664.981:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.373853][ T4720] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:25 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x40000004}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 14:34:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) [ 48.393277][ T22] audit: type=1326 audit(1621607665.001:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=85 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.421833][ T22] audit: type=1326 audit(1621607665.001:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 14:34:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) 14:34:25 executing program 2: r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x70, 0xcf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t\t>6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) [ 48.445714][ T22] audit: type=1326 audit(1621607665.001:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=8 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.478518][ T22] audit: type=1326 audit(1621607665.001:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 14:34:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) [ 48.508364][ T22] audit: type=1326 audit(1621607665.001:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.532739][ T22] audit: type=1326 audit(1621607665.021:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.577396][ T22] audit: type=1326 audit(1621607665.021:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=85 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.605344][ T22] audit: type=1326 audit(1621607665.021:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 48.637856][ T22] audit: type=1326 audit(1621607665.021:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4708 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 14:34:27 executing program 2: r0 = perf_event_open(&(0x7f00000015c0)={0x2, 0x70, 0xcf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t\t>6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) 14:34:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000101010200000000000f00000a0000000c001980080002c0"], 0x24}}, 0x0) 14:34:27 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x40000004}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 14:34:27 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) 14:34:27 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) 14:34:27 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) mincore(&(0x7f00002f3000/0xc00000)=nil, 0xc00000, &(0x7f00000010c0)=""/124) 14:34:28 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x40000004}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 14:34:28 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) 14:34:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000101010200000000000f00000a0000000c001980080002c0"], 0x24}}, 0x0) 14:34:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="240000001a005f0223b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 14:34:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="240000001a005f0223b3f40700090400020000000010000000fe0000080001007f020001", 0x24) [ 51.364980][ T4764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:28 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) mincore(&(0x7f00002f3000/0xc00000)=nil, 0xc00000, &(0x7f00000010c0)=""/124) 14:34:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:28 executing program 0: syz_io_uring_setup(0x2c58, &(0x7f0000000000)={0x0, 0x4771, 0x1f, 0x2}, &(0x7f0000a0d000/0x3000)=nil, &(0x7f0000ace000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 14:34:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:34:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="240000001a005f0223b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 14:34:28 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) mincore(&(0x7f00002f3000/0xc00000)=nil, 0xc00000, &(0x7f00000010c0)=""/124) 14:34:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000101010200000000000f00000a0000000c001980080002c0"], 0x24}}, 0x0) [ 51.428295][ T4783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:28 executing program 0: syz_io_uring_setup(0x2c58, &(0x7f0000000000)={0x0, 0x4771, 0x1f, 0x2}, &(0x7f0000a0d000/0x3000)=nil, &(0x7f0000ace000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 14:34:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="240000001a005f0223b3f40700090400020000000010000000fe0000080001007f020001", 0x24) 14:34:28 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) mincore(&(0x7f00002f3000/0xc00000)=nil, 0xc00000, &(0x7f00000010c0)=""/124) 14:34:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:34:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000140)={'sit0\x00', 0x0}) [ 51.503379][ T4800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:34:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:28 executing program 0: syz_io_uring_setup(0x2c58, &(0x7f0000000000)={0x0, 0x4771, 0x1f, 0x2}, &(0x7f0000a0d000/0x3000)=nil, &(0x7f0000ace000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 14:34:28 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53efb90201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000180)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000400)=ANY=[]) 14:34:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000140)={'sit0\x00', 0x0}) 14:34:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:34:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000140)={'sit0\x00', 0x0}) [ 51.784549][ T4843] loop1: detected capacity change from 0 to 1024 [ 51.792324][ T4843] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 51.817024][ T4843] EXT4-fs (loop1): orphan cleanup on readonly fs [ 51.823411][ T4843] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 33554432 14:34:28 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 0: syz_io_uring_setup(0x2c58, &(0x7f0000000000)={0x0, 0x4771, 0x1f, 0x2}, &(0x7f0000a0d000/0x3000)=nil, &(0x7f0000ace000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 14:34:28 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000140)={'sit0\x00', 0x0}) [ 51.834395][ T4843] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) [ 51.943616][ T4878] ================================================================== [ 51.951766][ T4878] BUG: KCSAN: data-race in __ext4_update_other_inode_time / __mark_inode_dirty [ 51.960790][ T4878] [ 51.963101][ T4878] write to 0xffff8881069cfcf8 of 8 bytes by task 1797 on cpu 0: [ 51.970726][ T4878] __mark_inode_dirty+0x223/0x6c0 [ 51.975758][ T4878] touch_atime+0x170/0x240 [ 51.980311][ T4878] step_into+0x869/0xec0 [ 51.984583][ T4878] walk_component+0x190/0x350 [ 51.989263][ T4878] path_lookupat+0x12d/0x570 [ 51.993846][ T4878] filename_lookup+0xff/0x390 [ 51.998518][ T4878] user_path_at_empty+0x3b/0x50 [ 52.003363][ T4878] __x64_sys_umount+0x75/0xd0 [ 52.008025][ T4878] do_syscall_64+0x4a/0x90 [ 52.012687][ T4878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 52.018570][ T4878] [ 52.020878][ T4878] read to 0xffff8881069cfcf8 of 8 bytes by task 4878 on cpu 1: [ 52.028754][ T4878] __ext4_update_other_inode_time+0x48/0x5c0 [ 52.034755][ T4878] ext4_mark_iloc_dirty+0x12b6/0x1750 [ 52.040113][ T4878] __ext4_mark_inode_dirty+0x4db/0x5b0 [ 52.045565][ T4878] ext4_dirty_inode+0x86/0xa0 [ 52.050238][ T4878] __mark_inode_dirty+0x77/0x6c0 [ 52.055177][ T4878] generic_write_end+0x157/0x180 [ 52.060363][ T4878] ext4_da_write_end+0x59b/0x730 [ 52.065288][ T4878] generic_perform_write+0x23e/0x3a0 [ 52.070587][ T4878] ext4_buffered_write_iter+0x2f2/0x3f0 [ 52.076124][ T4878] ext4_file_write_iter+0x2e7/0x11d0 [ 52.081409][ T4878] vfs_write+0x69d/0x770 [ 52.085641][ T4878] ksys_write+0xce/0x180 [ 52.089880][ T4878] __x64_sys_write+0x3e/0x50 14:34:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:28 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53efb90201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000180)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000400)=ANY=[]) [ 52.094465][ T4878] do_syscall_64+0x4a/0x90 [ 52.098868][ T4878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 52.104786][ T4878] [ 52.107226][ T4878] Reported by Kernel Concurrency Sanitizer on: [ 52.113554][ T4878] CPU: 1 PID: 4878 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 52.122241][ T4878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 52.132365][ T4878] ================================================================== 14:34:28 executing program 5: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 14:34:28 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) [ 52.232752][ T4899] loop1: detected capacity change from 0 to 1024 14:34:28 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf, 0x11, r0, 0x10000000) 14:34:28 executing program 5: unshare(0x20000600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5414, 0x0) [ 52.275079][ T4899] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 14:34:29 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf, 0x11, r0, 0x10000000) 14:34:29 executing program 5: unshare(0x20000600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5414, 0x0) [ 52.352988][ T4899] EXT4-fs (loop1): orphan cleanup on readonly fs [ 52.359425][ T4899] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 33554432 [ 52.370320][ T4899] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53efb90201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000180)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000400)=ANY=[]) 14:34:29 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf, 0x11, r0, 0x10000000) 14:34:29 executing program 5: unshare(0x20000600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5414, 0x0) 14:34:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:29 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xf, 0x11, r0, 0x10000000) 14:34:29 executing program 5: unshare(0x20000600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5414, 0x0) [ 52.735384][ T4962] loop1: detected capacity change from 0 to 1024 [ 52.748733][ T4962] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 52.770270][ T4962] EXT4-fs (loop1): orphan cleanup on readonly fs 14:34:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/85, &(0x7f00000000c0)=0x55) [ 52.776869][ T4962] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 33554432 [ 52.787740][ T4962] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53efb90201000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000180)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000001c0)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000400)=ANY=[]) 14:34:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/85, &(0x7f00000000c0)=0x55) 14:34:29 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) [ 52.929033][ T4997] loop1: detected capacity change from 0 to 1024 [ 52.942095][ T4997] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 52.952110][ T4997] EXT4-fs (loop1): orphan cleanup on readonly fs [ 52.958492][ T4997] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 33554432 [ 52.969365][ T4997] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000000)={0x9, 0x100000001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') setxattr$incfs_id(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file2\x00', 0x0) 14:34:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/85, &(0x7f00000000c0)=0x55) 14:34:29 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:29 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5435, 0x0) 14:34:29 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/85, &(0x7f00000000c0)=0x55) 14:34:29 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:29 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0xff00000000000000}, 0x0, 0x0, 0xff, 0x1}, 0x20) 14:34:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5435, 0x0) 14:34:29 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0xff00000000000000}, 0x0, 0x0, 0xff, 0x1}, 0x20) 14:34:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0xff00000000000000}, 0x0, 0x0, 0xff, 0x1}, 0x20) 14:34:30 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000380)='system_u:object_r:agp_device_t:s0\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 14:34:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5435, 0x0) 14:34:30 executing program 0: set_mempolicy(0x4001, &(0x7f0000000000)=0xffffffff, 0x7) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:34:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/229, 0xe5, 0x6) 14:34:30 executing program 0: set_mempolicy(0x4001, &(0x7f0000000000)=0xffffffff, 0x7) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:34:30 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x2000000000000000) 14:34:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback={0xff00000000000000}, 0x0, 0x0, 0xff, 0x1}, 0x20) 14:34:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/229, 0xe5, 0x6) 14:34:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x5435, 0x0) 14:34:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 0: set_mempolicy(0x4001, &(0x7f0000000000)=0xffffffff, 0x7) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:34:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/229, 0xe5, 0x6) 14:34:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x2000000000000000) 14:34:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x28}}, 0x0) 14:34:30 executing program 0: set_mempolicy(0x4001, &(0x7f0000000000)=0xffffffff, 0x7) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 14:34:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/229, 0xe5, 0x6) 14:34:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x28}}, 0x0) 14:34:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x2000000000000000) 14:34:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 0: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x28}}, 0x0) 14:34:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0x12000005f) 14:34:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x28}}, 0x0) 14:34:30 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x81) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/78, 0x4e}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/15, 0xf}], 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) 14:34:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:30 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x2000000000000000) 14:34:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000480)={0x120, 0x19, 0x1, 0x0, 0x0, "", [@typed={0x102, 0x0, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @generic='b']}, 0x120}], 0x1}, 0x0) 14:34:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef030001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000340)) 14:34:30 executing program 0: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:30 executing program 5: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000480)={0x120, 0x19, 0x1, 0x0, 0x0, "", [@typed={0x102, 0x0, 0x0, 0x0, @binary="6186f90b81daee70f8000500e8859db117f449d7d1d2869f916865253f07ec10ead59da6cfc1f44b5a7600e26e2efd58c2d13ecf09cbf1db90a319f7871e7f94a2d487af9de0a2fd0d38561e43489c31a105fccdd151b6ca7d4fd4f54a1aace0497f66e1d7f6f98c687de4a5ca42f1bbdf409142eb6cae41e3c87a13d3343088589683f8dd2c3a88ac261c9ad11b847e78bc11ff4949803092d252c5160764d4fc18c43712ed25e27efa9d23b5beb5b1d1288a742c2bfc2e321167d66ce0c896d3576f6ebe2683049945ac61756924853541dc5a90b54014b0a07c73d66650de2a127ccc27286823538b4dab8d06f6c9b32742703d42aa7c95a4e0282760"}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @generic='b']}, 0x120}], 0x1}, 0x0) [ 54.003176][ T5159] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 54.011325][ T5159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 54.024981][ T5161] loop4: detected capacity change from 0 to 4096 14:34:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 54.066751][ T5174] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 54.073661][ T5161] EXT4-fs (loop4): warning: mounting fs with errors, running e2fsck is recommended [ 54.075004][ T5174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000480)={0x120, 0x19, 0x1, 0x0, 0x0, "", [@typed={0x102, 0x0, 0x0, 0x0, @binary="6186f90b81daee70f8000500e8859db117f449d7d1d2869f916865253f07ec10ead59da6cfc1f44b5a7600e26e2efd58c2d13ecf09cbf1db90a319f7871e7f94a2d487af9de0a2fd0d38561e43489c31a105fccdd151b6ca7d4fd4f54a1aace0497f66e1d7f6f98c687de4a5ca42f1bbdf409142eb6cae41e3c87a13d3343088589683f8dd2c3a88ac261c9ad11b847e78bc11ff4949803092d252c5160764d4fc18c43712ed25e27efa9d23b5beb5b1d1288a742c2bfc2e321167d66ce0c896d3576f6ebe2683049945ac61756924853541dc5a90b54014b0a07c73d66650de2a127ccc27286823538b4dab8d06f6c9b32742703d42aa7c95a4e0282760"}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @generic='b']}, 0x120}], 0x1}, 0x0) 14:34:30 executing program 0: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 54.113095][ T5161] EXT4-fs (loop4): Errors on filesystem, clearing orphan list. [ 54.113095][ T5161] [ 54.122894][ T5161] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 54.167984][ T5181] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 54.176188][ T5181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x81) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/78, 0x4e}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/15, 0xf}], 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) 14:34:33 executing program 5: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef030001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000340)) 14:34:33 executing program 0: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) 14:34:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000480)={0x120, 0x19, 0x1, 0x0, 0x0, "", [@typed={0x102, 0x0, 0x0, 0x0, @binary="6186f90b81daee70f8000500e8859db117f449d7d1d2869f916865253f07ec10ead59da6cfc1f44b5a7600e26e2efd58c2d13ecf09cbf1db90a319f7871e7f94a2d487af9de0a2fd0d38561e43489c31a105fccdd151b6ca7d4fd4f54a1aace0497f66e1d7f6f98c687de4a5ca42f1bbdf409142eb6cae41e3c87a13d3343088589683f8dd2c3a88ac261c9ad11b847e78bc11ff4949803092d252c5160764d4fc18c43712ed25e27efa9d23b5beb5b1d1288a742c2bfc2e321167d66ce0c896d3576f6ebe2683049945ac61756924853541dc5a90b54014b0a07c73d66650de2a127ccc27286823538b4dab8d06f6c9b32742703d42aa7c95a4e0282760"}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @generic='b']}, 0x120}], 0x1}, 0x0) 14:34:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:33 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x81) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/78, 0x4e}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/15, 0xf}], 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) 14:34:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 56.977492][ T5204] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 56.985667][ T5204] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 57.011749][ T5207] loop4: detected capacity change from 0 to 4096 14:34:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:33 executing program 5: r0 = syz_io_uring_setup(0x185, &(0x7f00000004c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f000042c000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000180)=0x2) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) dup2(r5, r3) [ 57.042099][ T5207] EXT4-fs (loop4): warning: mounting fs with errors, running e2fsck is recommended [ 57.067601][ T5207] EXT4-fs (loop4): Errors on filesystem, clearing orphan list. [ 57.067601][ T5207] [ 57.077381][ T5207] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef030001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000340)) [ 57.188957][ T5248] loop4: detected capacity change from 0 to 4096 [ 57.200937][ T5248] EXT4-fs (loop4): warning: mounting fs with errors, running e2fsck is recommended [ 57.211232][ T5248] EXT4-fs (loop4): Errors on filesystem, clearing orphan list. [ 57.211232][ T5248] [ 57.221352][ T5248] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:36 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x81) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/78, 0x4e}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/15, 0xf}], 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) 14:34:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:36 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 14:34:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef030001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000340)) 14:34:36 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) exit_group(0x81) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000180)=""/78, 0x4e}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/15, 0xf}], 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) 14:34:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000100)={0x0, 0x0, 0x2be20000}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 14:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x4}, {0x35}, {0x6, 0x0, 0x0, 0x7fffff7a}]}) epoll_create1(0x0) [ 60.018133][ T5271] loop4: detected capacity change from 0 to 4096 [ 60.036644][ T5271] EXT4-fs (loop4): warning: mounting fs with errors, running e2fsck is recommended 14:34:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') read$rfkill(r0, &(0x7f0000000040), 0x20000048) read$rfkill(r0, &(0x7f0000000100), 0x8) 14:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x4}, {0x35}, {0x6, 0x0, 0x0, 0x7fffff7a}]}) epoll_create1(0x0) [ 60.065442][ T5271] EXT4-fs (loop4): Errors on filesystem, clearing orphan list. [ 60.065442][ T5271] [ 60.075222][ T5271] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:34:36 executing program 3: set_mempolicy(0x3, &(0x7f0000000280)=0xb, 0x2005) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x00CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x7, 0x8, @loopback=0x7f000003}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x134}}, 0x0) 14:34:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x4}, {0x35}, {0x6, 0x0, 0x0, 0x7fffff7a}]}) epoll_create1(0x0)