[ 96.536275][ T27] audit: type=1800 audit(1581806573.702:36): pid=10448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [ 97.273489][ T27] audit: type=1400 audit(1581806574.552:37): avc: denied { watch } for pid=10543 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.215' (ECDSA) to the list of known hosts. 2020/02/15 22:43:02 fuzzer started syzkaller login: [ 105.384244][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 105.384264][ T27] audit: type=1400 audit(1581806582.662:42): avc: denied { map } for pid=10635 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/15 22:43:03 dialing manager at 10.128.0.26:39673 2020/02/15 22:43:04 syscalls: 2966 2020/02/15 22:43:04 code coverage: enabled 2020/02/15 22:43:04 comparison tracing: enabled 2020/02/15 22:43:04 extra coverage: enabled 2020/02/15 22:43:04 setuid sandbox: enabled 2020/02/15 22:43:04 namespace sandbox: enabled 2020/02/15 22:43:04 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/15 22:43:04 fault injection: enabled 2020/02/15 22:43:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/15 22:43:04 net packet injection: enabled 2020/02/15 22:43:04 net device setup: enabled 2020/02/15 22:43:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/15 22:43:04 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 106.773872][ T27] audit: type=1400 audit(1581806584.052:43): avc: denied { integrity } for pid=10650 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 22:45:50 executing program 0: [ 273.076526][ T27] audit: type=1400 audit(1581806750.362:44): avc: denied { map } for pid=10652 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1099 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 22:45:50 executing program 1: [ 273.274241][T10653] IPVS: ftp: loaded support on port[0] = 21 [ 273.306732][ T27] audit: type=1400 audit(1581806750.582:45): avc: denied { map } for pid=10635 comm="syz-fuzzer" path="/root/syzkaller-shm342710603" dev="sda1" ino=16497 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 273.494243][T10656] IPVS: ftp: loaded support on port[0] = 21 [ 273.496532][T10653] chnl_net:caif_netlink_parms(): no params data found 22:45:50 executing program 2: [ 273.624322][T10653] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.646344][T10653] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.666341][T10653] device bridge_slave_0 entered promiscuous mode [ 273.686398][T10653] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.696708][T10653] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.726952][T10653] device bridge_slave_1 entered promiscuous mode [ 273.803678][T10653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.853265][T10653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.907106][T10656] chnl_net:caif_netlink_parms(): no params data found [ 273.920036][T10653] team0: Port device team_slave_0 added [ 273.930110][T10653] team0: Port device team_slave_1 added [ 273.933031][T10661] IPVS: ftp: loaded support on port[0] = 21 22:45:51 executing program 3: [ 273.961443][T10653] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 273.968705][T10653] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 273.996807][T10653] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 274.031974][T10653] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 274.057583][T10653] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.087564][T10653] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 274.194902][T10656] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.205252][T10656] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.214821][T10656] device bridge_slave_0 entered promiscuous mode [ 274.270686][T10653] device hsr_slave_0 entered promiscuous mode 22:45:51 executing program 4: [ 274.358135][T10653] device hsr_slave_1 entered promiscuous mode [ 274.441221][T10656] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.451051][T10656] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.477345][T10656] device bridge_slave_1 entered promiscuous mode [ 274.554614][T10656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.565151][T10667] IPVS: ftp: loaded support on port[0] = 21 [ 274.600615][T10656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.647817][T10669] IPVS: ftp: loaded support on port[0] = 21 22:45:52 executing program 5: [ 274.703023][T10656] team0: Port device team_slave_0 added [ 274.764344][T10656] team0: Port device team_slave_1 added [ 274.815731][T10656] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 274.822823][T10656] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.849361][T10656] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 274.863783][T10656] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 274.871776][T10656] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 274.898410][T10656] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 274.932774][T10661] chnl_net:caif_netlink_parms(): no params data found [ 275.006649][T10672] IPVS: ftp: loaded support on port[0] = 21 [ 275.059217][T10656] device hsr_slave_0 entered promiscuous mode [ 275.097177][T10656] device hsr_slave_1 entered promiscuous mode [ 275.136852][T10656] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 275.144633][T10656] Cannot create hsr debugfs directory [ 275.234042][ T27] audit: type=1400 audit(1581806752.512:46): avc: denied { create } for pid=10653 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 275.242248][T10661] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.267174][T10661] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.275103][T10661] device bridge_slave_0 entered promiscuous mode [ 275.275162][ T27] audit: type=1400 audit(1581806752.512:47): avc: denied { write } for pid=10653 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 275.285125][T10661] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.313690][ T27] audit: type=1400 audit(1581806752.512:48): avc: denied { read } for pid=10653 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 275.314616][T10661] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.346467][T10661] device bridge_slave_1 entered promiscuous mode [ 275.368223][T10653] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 275.464084][T10661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.474444][T10653] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 275.520387][T10653] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 275.598785][T10661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.621613][T10653] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 275.669036][T10667] chnl_net:caif_netlink_parms(): no params data found [ 275.713731][T10661] team0: Port device team_slave_0 added [ 275.726553][T10661] team0: Port device team_slave_1 added [ 275.783698][T10661] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 275.791452][T10661] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.818588][T10661] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 275.833238][T10661] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 275.840466][T10661] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.866803][T10661] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 275.905692][T10669] chnl_net:caif_netlink_parms(): no params data found [ 276.029857][T10661] device hsr_slave_0 entered promiscuous mode [ 276.086770][T10661] device hsr_slave_1 entered promiscuous mode [ 276.156356][T10661] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 276.165143][T10661] Cannot create hsr debugfs directory [ 276.203192][T10656] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 276.258964][T10656] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 276.355850][T10656] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 276.418570][T10667] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.426400][T10667] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.434860][T10667] device bridge_slave_0 entered promiscuous mode [ 276.461218][T10656] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 276.518644][T10667] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.526078][T10667] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.535321][T10667] device bridge_slave_1 entered promiscuous mode [ 276.632244][T10672] chnl_net:caif_netlink_parms(): no params data found [ 276.644204][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.655906][T10669] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.664770][T10669] device bridge_slave_0 entered promiscuous mode [ 276.718458][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.726131][T10669] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.735013][T10669] device bridge_slave_1 entered promiscuous mode [ 276.744220][T10667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.761299][T10667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.818428][T10667] team0: Port device team_slave_0 added [ 276.844260][T10669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.862936][T10667] team0: Port device team_slave_1 added [ 276.889934][T10669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.972946][T10669] team0: Port device team_slave_0 added [ 276.986930][T10669] team0: Port device team_slave_1 added [ 277.001750][T10667] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 277.010686][T10667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.039566][T10667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 277.052653][T10672] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.062384][T10672] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.071482][T10672] device bridge_slave_0 entered promiscuous mode [ 277.113610][T10667] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 277.123495][T10667] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.152260][T10667] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 277.163941][T10672] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.174864][T10672] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.184118][T10672] device bridge_slave_1 entered promiscuous mode [ 277.244278][T10661] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 277.260218][T10669] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 277.273865][T10669] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.305894][T10669] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 277.340709][T10672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 277.352599][T10661] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 277.398966][T10669] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 277.406048][T10669] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 277.434869][T10669] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 277.509732][T10667] device hsr_slave_0 entered promiscuous mode [ 277.566776][T10667] device hsr_slave_1 entered promiscuous mode [ 277.616397][T10667] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 277.624444][T10667] Cannot create hsr debugfs directory [ 277.633994][T10653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.643766][T10672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 277.655505][T10661] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 277.742050][T10661] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 277.832873][T10672] team0: Port device team_slave_0 added [ 277.849364][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.858942][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.909644][T10669] device hsr_slave_0 entered promiscuous mode [ 277.946830][T10669] device hsr_slave_1 entered promiscuous mode [ 277.996797][T10669] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 278.004513][T10669] Cannot create hsr debugfs directory [ 278.015029][T10653] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.024399][T10672] team0: Port device team_slave_1 added [ 278.094853][T10656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.111488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.121845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.130884][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.138440][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.183231][T10672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.191434][T10672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.220820][T10672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.235427][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.244184][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.253620][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.263304][ T2934] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.270786][ T2934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.286888][T10656] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.312023][T10672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.320855][T10672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.347872][T10672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 278.363847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.376552][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.384965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.424338][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.441415][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.452513][ T2934] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.460022][ T2934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.468762][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.477823][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.486563][ T2934] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.494276][ T2934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.502980][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.621306][T10672] device hsr_slave_0 entered promiscuous mode [ 278.666710][T10672] device hsr_slave_1 entered promiscuous mode [ 278.706609][T10672] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 278.714705][T10672] Cannot create hsr debugfs directory [ 278.733436][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.744295][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 278.754543][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.776616][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.790328][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.799720][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 278.810161][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.820214][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.828537][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 278.862663][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.872629][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.882142][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.891470][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.906465][T10667] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 279.001337][T10661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.009605][T10667] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 279.060648][T10667] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 279.118833][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.128135][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.138238][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.150169][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.206714][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.215453][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.225805][T10667] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 279.274279][T10669] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 279.319613][T10669] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 279.395724][T10656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.407068][T10653] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.419731][T10653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.431077][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.442929][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.452157][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.460695][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.471301][T10669] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 279.529987][T10661] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.568735][T10669] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 279.608925][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.619929][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.629707][ T3002] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.637434][ T3002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.645538][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.657498][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.666018][ T3002] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.673553][ T3002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.696343][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.704621][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.715584][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.760364][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.773004][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.783626][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.813714][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.824225][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.832757][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.842632][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.885840][T10653] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.902313][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.912045][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.919615][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.929298][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.947535][T10656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.006817][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.015832][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.073024][T10672] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 280.123519][T10661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.133331][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.143297][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.173173][T10672] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 280.208689][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.217829][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.258730][T10672] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 280.295440][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.305966][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.315713][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.323995][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.356890][T10672] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 280.393669][T10653] device veth0_vlan entered promiscuous mode [ 280.406957][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.415518][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.429615][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.437700][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.457509][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.465440][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.487323][T10656] device veth0_vlan entered promiscuous mode [ 280.512951][T10667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.536027][T10669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.545209][T10653] device veth1_vlan entered promiscuous mode [ 280.577840][T10661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.593981][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 280.604613][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 280.613657][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.622256][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.637238][T10656] device veth1_vlan entered promiscuous mode [ 280.651848][T10667] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.691256][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 280.700530][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 280.710870][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.719465][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.734430][T10669] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.770420][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.781176][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.790308][ T3013] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.797766][ T3013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.805756][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.816428][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.825248][ T3013] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.832673][ T3013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.840993][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 280.850719][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.888845][T10653] device veth0_macvtap entered promiscuous mode [ 280.905955][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.917340][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.927325][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 280.937363][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.946894][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.957328][ T2934] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.965318][ T2934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.975026][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 280.983769][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.019775][T10656] device veth0_macvtap entered promiscuous mode [ 281.042991][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.053845][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.064890][ T2700] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.072239][ T2700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.081000][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.090179][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.099424][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.108531][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.117984][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.130474][T10653] device veth1_macvtap entered promiscuous mode [ 281.151713][T10656] device veth1_macvtap entered promiscuous mode [ 281.165967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 281.178587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.189009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.199093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.208968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.245980][T10653] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 281.268622][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.279159][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.290927][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.300034][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.309249][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.318829][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.328010][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.372949][T10653] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 281.385070][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.394313][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.404251][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.413221][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.422785][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.431988][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.440933][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.450930][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.459971][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.476322][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 281.485028][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.497831][T10669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.507559][T10656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 281.521562][T10656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.534504][T10656] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 281.556158][T10661] device veth0_vlan entered promiscuous mode [ 281.572089][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.580187][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.589071][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.599161][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.609732][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.619036][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.642689][T10656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 281.655922][T10656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 281.670317][T10656] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 281.701737][T10661] device veth1_vlan entered promiscuous mode [ 281.717560][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 281.726052][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.736670][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.745703][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.754872][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.773334][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.929865][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 281.939311][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 281.947817][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 281.955299][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 281.963274][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.049541][T10667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 282.059085][ T27] audit: type=1400 audit(1581806759.342:49): avc: denied { associate } for pid=10653 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 282.071874][T10672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.109102][T10669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 282.200016][T10661] device veth0_macvtap entered promiscuous mode [ 282.267253][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.275878][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 22:45:59 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x9) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = getpid() r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) ftruncate(r3, 0x3) tkill(r2, 0x0) sched_getparam(r2, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) msgsnd(0x0, &(0x7f0000000140)={0x2}, 0x8, 0x0) syz_open_procfs(0x0, 0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, r4, 0x122, 0x2}, 0x0, 0x0, 0x2, 0xc00, 0x100000001, 0x674, 0x276, 0x80, 0x3ffc, 0xbcf, r5}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) [ 282.339617][T10661] device veth1_macvtap entered promiscuous mode [ 282.365938][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 282.380859][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.391909][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 282.405889][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.420430][ T27] audit: type=1400 audit(1581806759.702:50): avc: denied { open } for pid=10696 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 282.451192][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.460705][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.472932][ T27] audit: type=1400 audit(1581806759.702:51): avc: denied { confidentiality } for pid=10696 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 282.509073][T10672] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.587702][ C0] hrtimer: interrupt took 39698 ns [ 282.636967][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.645842][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.663924][ T2934] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.671076][ T2934] bridge0: port 1(bridge_slave_0) entered forwarding state 22:46:00 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x9) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r2 = getpid() r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) ftruncate(r3, 0x3) tkill(r2, 0x0) sched_getparam(r2, &(0x7f0000000200)) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) msgsnd(0x0, &(0x7f0000000140)={0x2}, 0x8, 0x0) syz_open_procfs(0x0, 0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, r4, 0x122, 0x2}, 0x0, 0x0, 0x2, 0xc00, 0x100000001, 0x674, 0x276, 0x80, 0x3ffc, 0xbcf, r5}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) [ 282.701535][T10661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.714694][T10661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.741058][T10661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 282.754444][T10661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 282.772845][T10661] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 282.793985][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.805526][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.850183][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.859707][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.868940][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.878350][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.888008][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.908412][ T2700] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.915988][ T2700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.942898][T10667] device veth0_vlan entered promiscuous mode 22:46:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0xc8140, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000002c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)=0x80) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r3, 0x0}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r4, 0x0}, 0x20) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r4, @ANYBLOB="2c747970653da300a2422c6769643d", @ANYRESHEX=0xee01, @ANYBLOB="2c706172743d3078663e925a8af034cc29666666666666392c73657373696f6e3d3078303030303030303030303070303030342c706172743d3078303030303030303030303030303030312c6769643d348038f23994489f0d365ec3b085727a7f6b6dcda62000cfe7d113179b5cf820ec6a3fa9924c594eb9", @ANYRESOCT=r3, @ANYBLOB='Hdecompose,force,\x00']) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="874b0500000000000000050000000800010000000000"], 0x1c}}, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x11, 0x2, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc}]}]}]}, 0x34}}, 0x0) accept$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14) sendmsg$NL80211_CMD_GET_STATION(r5, &(0x7f0000000680)={&(0x7f0000000500), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x34, r7, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_VLAN={0x8, 0x14, r10}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x5}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r11}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) bind$rxrpc(r1, &(0x7f0000000380)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x346, @mcast2, 0x219400}}, 0x24) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000300)) r12 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x101, 0x2000) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r13, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$PERF_EVENT_IOC_ID(r13, 0x80082407, &(0x7f00000004c0)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r12, 0x84, 0x15, &(0x7f0000000480)={0x5}, 0x1) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r14, 0x0}, 0x20) fsetxattr$trusted_overlay_origin(r14, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3) ioctl$CAPI_INSTALLED(0xffffffffffffffff, 0x80024322) [ 282.960006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.989178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.020586][T10661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.038659][T10661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.070965][T10661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 283.090172][T10661] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 283.106590][T10661] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 283.124826][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.137882][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.137953][ T27] audit: type=1400 audit(1581806760.422:52): avc: denied { map_create } for pid=10708 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:46:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000040)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x6, 0x8001, 0x1f, 0x697c, 0x0, 0x8, 0x80, r5}, 0x20) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) [ 283.147337][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.170339][ T27] audit: type=1400 audit(1581806760.422:53): avc: denied { map_read map_write } for pid=10708 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 283.210350][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 283.219735][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.228984][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.272958][T10709] hfsplus: unable to parse mount options [ 283.338735][T10667] device veth1_vlan entered promiscuous mode [ 283.366872][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.375713][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.393172][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.408385][ T27] audit: type=1400 audit(1581806760.692:54): avc: denied { kernel } for pid=10712 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 283.414439][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.531016][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 283.539537][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.548065][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 22:46:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=ANY=[@ANYBLOB="840804047f080c0e00000000000000000000000000000001ff01000000000000000000004b124a0af7ffffff0000000000000000000000000000000000aa00"/72], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x10e182) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) fchownat(r3, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f00000001c0)={{0x2, 0x20}, {0x8, 0x3}, 0x1f, 0x0, 0x2}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000540)=[@in={0x2, 0x4e21, @multicast1}], 0x10) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) geteuid() r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {}, [], {0x4, 0x8}}, 0x24, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) [ 283.643179][T10669] device veth0_vlan entered promiscuous mode [ 283.655165][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.674634][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.706416][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.721750][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 22:46:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000040)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x6, 0x8001, 0x1f, 0x697c, 0x0, 0x8, 0x80, r5}, 0x20) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) [ 283.883692][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.900383][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:46:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=ANY=[@ANYBLOB="840804047f080c0e00000000000000000000000000000001ff01000000000000000000004b124a0af7ffffff0000000000000000000000000000000000aa00"/72], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x10e182) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) fchownat(r3, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f00000001c0)={{0x2, 0x20}, {0x8, 0x3}, 0x1f, 0x0, 0x2}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000540)=[@in={0x2, 0x4e21, @multicast1}], 0x10) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) geteuid() r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {}, [], {0x4, 0x8}}, 0x24, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) [ 283.931392][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 283.965127][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.037755][T10669] device veth1_vlan entered promiscuous mode [ 284.053755][T10667] device veth0_macvtap entered promiscuous mode [ 284.081198][T10672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.122723][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.134677][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 22:46:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000040)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x6, 0x8001, 0x1f, 0x697c, 0x0, 0x8, 0x80, r5}, 0x20) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) 22:46:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000040)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x6, 0x8001, 0x1f, 0x697c, 0x0, 0x8, 0x80, r5}, 0x20) write(0xffffffffffffffff, &(0x7f0000000000)="d5", 0xfffffedf) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) [ 284.231715][T10667] device veth1_macvtap entered promiscuous mode [ 284.329440][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.363879][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.461621][T10672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.497817][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.511343][ T2982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.647986][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.684009][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.695035][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.709494][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.719866][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 284.738803][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.751468][T10667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.765772][T10669] device veth0_macvtap entered promiscuous mode [ 284.784702][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.794544][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.814630][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.840409][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 284.851340][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.881636][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 284.894265][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.904591][T10667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 284.915333][T10667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 284.929059][T10667] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 284.942735][T10669] device veth1_macvtap entered promiscuous mode [ 284.953624][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.963276][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.972386][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.130145][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.146302][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.157185][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.167818][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.177913][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.188802][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.198744][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.210256][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.221967][T10669] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 285.300310][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.315138][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.324627][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.333440][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.345315][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.359000][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.369305][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.379871][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.390112][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.402380][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.412509][T10669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.423384][T10669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.436082][T10669] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.470267][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.480888][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.492837][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.502442][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 22:46:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) sched_setparam(r1, &(0x7f0000000000)=0x6) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) [ 285.520682][T10672] device veth0_vlan entered promiscuous mode [ 285.550557][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.559809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.652777][T10672] device veth1_vlan entered promiscuous mode [ 285.800550][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.811957][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.820881][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.830045][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.844646][T10672] device veth0_macvtap entered promiscuous mode [ 285.868141][T10672] device veth1_macvtap entered promiscuous mode 22:46:03 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$packet(0x11, 0x0, 0x300) syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000140)={0x8, 0x3ff, 0xfffffff9, 0x2, 0x9, 0xfffffffffffff40e}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) fcntl$setown(r4, 0x8, r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r6, 0x0}, 0x20) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000740)={0xa20000, 0x6, 0x7, r6, 0x0, &(0x7f0000000440)={0x980906, 0x100, [], @string=&(0x7f00000001c0)=0x9}}) perf_event_open(&(0x7f00000006c0)={0x3, 0x70, 0x1, 0x0, 0x80, 0x20, 0x0, 0xd, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x6}, 0x80, 0x9, 0x94, 0x6, 0x5, 0xaad, 0x5}, r3, 0x0, r7, 0x3) socket$kcm(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x9) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x589400, 0x0) r9 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r8, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02000000", @ANYRES16=r9, @ANYBLOB="000229bd7000fcdbdf250400000008000100010000000800010003000000080002000200000008000200020000000800020002000000080001000300000008000200020000000800010001000000"], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRESHEX], 0x2, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x103000, 0x0) sched_getparam(0x0, &(0x7f0000000200)) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bic\x00', 0x4) sendto$inet(r10, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) [ 285.912236][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.936128][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.946103][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.966082][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.982800][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.995372][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.012572][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.023895][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.034317][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.045947][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.058559][T10672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.069003][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.077940][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.085931][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.096121][ T2700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.109821][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.127409][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.142799][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.154731][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.173144][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.184549][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.201053][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.212831][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.229356][T10672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.243179][T10672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.294111][T10672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.309276][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.325747][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 22:46:03 executing program 5: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r1, 0x200, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0xc}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x20}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x200480c1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x1c, r3, 0xb0343aabd1184b87, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000400)={0x0, 'vcan0\x00', {0x3}, 0x5}) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f00000001c0)={0x2, 0x4}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="48000000000000001401000001000000000000000000000000000000000000002c00000000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB="0002410000000000"], @ANYBLOB="01fbff000000000000000000000800000000040000000000"], 0x48}, 0x0) 22:46:03 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f0000000080)) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="48000000000000001401000001000000000000000000000000000000000000006c00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[], @ANYBLOB='`Dl'], @ANYBLOB="0100"/24], 0x48}, 0x0) 22:46:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001180)={0x14, 0x24, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000, 0x0, 0x10000}, 0x0) 22:46:04 executing program 2: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x53, &(0x7f0000000180), 0x4010, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x8000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) write$P9_RREADDIR(r1, &(0x7f0000000000)={0x2a, 0x29, 0x1, {0x7fffffff, [{{0x9c9d0e63e90e200e, 0x2, 0x5}, 0xc1e4, 0xb3, 0x7, './file0'}]}}, 0x2a) 22:46:04 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/145, 0x91}], 0x1, &(0x7f0000000280)=""/189, 0xbd}}], 0x1, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/checkreqprot\x00', 0x1ff103, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) write$binfmt_elf32(r1, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000062, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg(0xffffffffffffffff, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000050a43ba5d806055b6fdd80b400000c13900060008000029ec2400020cd37e99d69cda45a95e", 0xffffffc2}], 0x1}, 0x0) connect$rxrpc(r3, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @empty}}, 0x24) sendmmsg(r3, &(0x7f0000005c00), 0x40000000000037b, 0xc000) 22:46:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0xe45) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8f0432530c32d20e, 0x0) accept$nfc_llcp(r3, &(0x7f0000000100), &(0x7f0000000080)=0x60) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc}]}]}]}, 0x34}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r7, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x4) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="000300800000ffffffff0500000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x44010}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r9, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) setsockopt$inet_mtu(r9, 0x0, 0xa, &(0x7f0000000300)=0x1, 0x4) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}], 0x1) [ 286.973527][ T27] audit: type=1400 audit(1581806764.252:55): avc: denied { ioctl } for pid=10777 comm="syz-executor.5" path="socket:[40083]" dev="sockfs" ino=40083 ioctlcmd=0x8982 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:46:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x25) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)=""/19, 0x13) r4 = open(&(0x7f0000000000)='./bus\x00', 0x600c2, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1ff}, 0x8) ftruncate(r4, 0x200004) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, &(0x7f00000001c0)) sendfile(r0, r4, 0x0, 0x80001d00c0d0) 22:46:04 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$packet(0x11, 0x0, 0x300) syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000140)={0x8, 0x3ff, 0xfffffff9, 0x2, 0x9, 0xfffffffffffff40e}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r4, 0xa, 0x12) dup2(r4, r5) fcntl$setown(r4, 0x8, r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r6, 0x0}, 0x20) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000740)={0xa20000, 0x6, 0x7, r6, 0x0, &(0x7f0000000440)={0x980906, 0x100, [], @string=&(0x7f00000001c0)=0x9}}) perf_event_open(&(0x7f00000006c0)={0x3, 0x70, 0x1, 0x0, 0x80, 0x20, 0x0, 0xd, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x6}, 0x80, 0x9, 0x94, 0x6, 0x5, 0xaad, 0x5}, r3, 0x0, r7, 0x3) socket$kcm(0x11, 0x0, 0x300) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x9) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x589400, 0x0) r9 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r8, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02000000", @ANYRES16=r9, @ANYBLOB="000229bd7000fcdbdf250400000008000100010000000800010003000000080002000200000008000200020000000800020002000000080001000300000008000200020000000800010001000000"], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRESHEX], 0x2, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x103000, 0x0) sched_getparam(0x0, &(0x7f0000000200)) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bic\x00', 0x4) sendto$inet(r10, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) [ 287.222053][ T27] audit: type=1400 audit(1581806764.412:56): avc: denied { setopt } for pid=10788 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:46:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000040), 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r3, 0x0, 0x400000000000007, &(0x7f0000937fed)=""/16, &(0x7f0000000080)=0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4, 0x9}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r4, 0x0}, 0x20) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$FIGETBSZ(r4, 0x2, &(0x7f00000000c0)) 22:46:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)={0x2, 0x4a21, @remote}, 0x10, 0x0}}, {{&(0x7f00000000c0)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_tos_int={{0x18}}], 0x18}}], 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x2900) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000080)={0x1}) 22:46:04 executing program 4: r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x82, &(0x7f0000000ac0), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x3, @local, 0x3}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x6}}, [0x80, 0x101, 0x1ff, 0x3, 0x3a000000, 0x8, 0x1, 0x3, 0xfffffffffffffffb, 0x1, 0xfff, 0x8, 0xffffffffffffff26, 0x1000000, 0x3]}, &(0x7f0000000180)=0x100) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000200)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000280)="b0", 0x1}], 0x1}, 0x0) 22:46:04 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x1, 0x0) write$9p(r0, &(0x7f0000000000)="0600000000000000c9b90003020000002a1ff7adf576f3790f68bc2c197cbf8d63735a09ab8383afd2de1a5587fe067fde18fa64249e1dabdd9514480a16f3733d18f833b3aacfcf04f7b0bdd78687423a6bff51b9f9218a249e3d00"/104, 0xb3) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) [ 287.590068][T10816] dlm: no locking on control device 22:46:04 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, &(0x7f0000000480)={r2, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0]}) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x1, 0x0, {0xc, 0x39, 0xa, 0x1f, 0x7, 0x91, 0x2, 0xd, 0x1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) sendto$x25(r4, &(0x7f0000000100)="f9e860cbc518724b8f25f2feedf5a79389496cf7b689502be28ec64fd29fd4f0c93f1b03a652d1e270b9bd52e149ebb7cdb3aa6658f62e6852c2554695a47edb69a3126155b8183fa589e9f87576fa372a6cff8b59ed06222704b6fbf4f1524d664842e6dfa4f96ac400715bd7415af782d69f482f48ffb177cf700713b97520c0ed047e873e34e495cb71e85775d014452cf2aa67b57bd5535bd8125672628d4cf4ee26c14a52f2fa4219eb042643a2ef11a6309b83d7937534bb1a1a1031291cc313f861b05b6e74930e93f0eb7df4642dd7bb611526", 0xd7, 0x40084, &(0x7f0000000200)={0x9, @remote={[], 0x3}}, 0x12) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e24, 0x1f7, @loopback, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x7f}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x1}], 0x58) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8000, &(0x7f0000000000)=0x3, 0x8, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x2) mknod(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4e6e) [ 287.635469][T10816] dlm: no locking on control device 22:46:05 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x0, 0x198, 0x0, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "ea7c5e89c8401b46ee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) r1 = socket(0x1e, 0x4, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x500, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44008}, 0x0) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000100)=0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) write(r2, &(0x7f0000000d00)="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", 0x1000) 22:46:05 executing program 4: r0 = getpid() clone3(&(0x7f0000001080)={0x28080100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001040)=[r0], 0x1}, 0x50) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x6) getsockname$unix(r3, &(0x7f0000000180), &(0x7f0000000100)=0x6e) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f00000005c0)=0x14) setresuid(0x0, r5, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x4, 0x7, {r1}, {r5}, 0x80, 0x8}) sched_setscheduler(r6, 0x1, &(0x7f00000000c0)=0x100) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:46:05 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a0000000800050002000000"], 0x3}}, 0x800) [ 287.963113][T10831] QAT: Invalid ioctl [ 288.038048][T10830] No such timeout policy "syz1" [ 288.104608][ T27] audit: type=1400 audit(1581806765.382:57): avc: denied { name_bind } for pid=10833 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 288.109557][T10831] QAT: Invalid ioctl 22:46:05 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) prctl$PR_CAPBSET_READ(0x17, 0x18) syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') ioctl$ASHMEM_GET_SIZE(r1, 0x40046f41, 0x76006e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = getpid() tkill(r3, 0x15) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) tgkill(r3, r5, 0x8) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) [ 288.195878][ T27] audit: type=1400 audit(1581806765.412:58): avc: denied { node_bind } for pid=10833 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 288.236044][T10844] No such timeout policy "syz1" 22:46:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffa, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x9000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x40100, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000140)=""/116) 22:46:05 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000013c0), 0x1000) [ 288.338287][ T27] audit: type=1400 audit(1581806765.552:59): avc: denied { name_connect } for pid=10833 comm="syz-executor.0" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 22:46:05 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x0, 0x198, 0x0, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "ea7c5e89c8401b46ee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) r1 = socket(0x1e, 0x4, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x500, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44008}, 0x0) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000100)=0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) write(r2, &(0x7f0000000d00)="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", 0x1000) [ 288.441944][T10833] dccp_close: ABORT with 20 bytes unread [ 288.559825][ T27] audit: type=1400 audit(1581806765.832:60): avc: denied { read } for pid=10854 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 22:46:05 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000013c0), 0x1000) [ 288.683235][T10858] No such timeout policy "syz1" 22:46:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x0, 0x198, 0x0, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "ea7c5e89c8401b46ee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) r1 = socket(0x1e, 0x4, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x500, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44008}, 0x0) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000100)=0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) write(r2, &(0x7f0000000d00)="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", 0x1000) 22:46:06 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:06 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:06 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000013c0), 0x1000) [ 289.114761][T10873] No such timeout policy "syz1" 22:46:06 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:06 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000013c0), 0x1000) 22:46:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffa, 0x6d1a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x9000000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x40100, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000140)=""/116) [ 289.680059][T10871] dccp_close: ABORT with 20 bytes unread [ 290.057413][T10883] dccp_close: ABORT with 20 bytes unread 22:46:08 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f0000000040)) 22:46:08 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:08 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:08 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:08 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:08 executing program 1: chdir(0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bridge\x00'}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}]}, 0x24}, 0x1, 0x0, 0x0, 0x48010}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 291.852892][T10914] overlayfs: lowerdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 291.958712][T10914] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 292.031889][T10912] overlayfs: lowerdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 22:46:09 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000002480)='/dev/audio#\x00', 0x1, 0x4242) 22:46:09 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) [ 292.093551][T10902] dccp_close: ABORT with 20 bytes unread 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 292.382323][T10937] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 292.432435][T10937] EXT4-fs (sda1): Ignoring removed bh option [ 292.506348][T10937] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 292.506348][T10937] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 292.506348][T10937] 22:46:09 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:09 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 22:46:09 executing program 3: open$dir(0x0, 0x521e80, 0x0) socket$caif_stream(0x25, 0x1, 0x0) io_setup(0x1000, &(0x7f0000000080)) r0 = socket$l2tp(0x2, 0x2, 0x73) io_setup(0x100, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000c80)=[&(0x7f0000000380)={0x300000000000006, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="f744eb", 0x3, 0x1e, 0x0, 0x2}]) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x1c, r3, 0xb0343aabd1184b87, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) bind(r2, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2710, @local}, 0x80) [ 292.586314][T10937] EXT4-fs (sda1): re-mounted. Opts: data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=, 22:46:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:10 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 292.822660][ T27] audit: type=1400 audit(1581806770.102:61): avc: denied { bind } for pid=10958 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:46:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 22:46:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 293.059110][T10972] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 293.086510][T10972] EXT4-fs (sda1): Ignoring removed bh option [ 293.092557][T10972] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 293.092557][T10972] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 293.092557][T10972] 22:46:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000ff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xf, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 293.205789][T10972] EXT4-fs (sda1): re-mounted. Opts: data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=, [ 293.283784][ T27] audit: type=1400 audit(1581806770.562:62): avc: denied { prog_load } for pid=10982 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:46:10 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x19, &(0x7f0000000040)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f00000001c0)={r8, 0x2, 0x4d78}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000300)={r9, 0x3}, 0x8) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r11 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r12, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r11, 0x4020ae76, &(0x7f0000000140)={r12, 0x9, 0x200, r13}) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) [ 293.480915][T10995] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 22:46:11 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 22:46:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 22:46:11 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:11 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000640)=""/132, 0x84}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x0) 22:46:11 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 294.006981][T11014] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 22:46:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000640)=""/132, 0x84}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x0) 22:46:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000500)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in=@multicast1=0xe0000008, 0x2, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}, 0x1, 0x2}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) 22:46:11 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="ab000000a6d23fa0c908488b6190f2d1d89677354590dde5ffb3b62ccfa516aec8038d48d684fba227e9983be9f367da66938eddee11b1613f0d5ff3b2213cdf2bd00a8ae552bc17ec5e974da678460b0aa7629aed35eb9bb9e096cc3825df10acb8c0df11579ba3856eb778df7afa4a3112676e9547e0d65bee83afa0b4f46a0b10af299da7efdcc6c573074de84403de7902a07096d74831940900775d355bd65460a5a52aa9cc384c962b12062cf85884362f08008b07349ecad51875cd1e6733aae279ef7d7600000000000000003dff730890f55c97bea2095e06dbd7456f845678b18c"], &(0x7f0000000540)=0x1) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000800000400000000e9ca"], 0x1}}, 0x0) mbind(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x8, 0x81, 0x1) r2 = msgget(0x1, 0xe) msgctl$MSG_STAT(r2, 0xb, &(0x7f00000004c0)=""/110) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x81, 0x0, 0x0, 0x50d, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) clone3(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) 22:46:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) [ 294.144260][T11014] EXT4-fs (sda1): Ignoring removed bh option 22:46:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 22:46:11 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 294.388046][T11042] mip6: mip6_destopt_init_state: spi is not 0: 33554432 [ 294.479426][T11042] mip6: mip6_destopt_init_state: spi is not 0: 33554432 22:46:12 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 22:46:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) 22:46:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:12 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') 22:46:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:12 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 295.263074][T11083] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 295.273753][T11083] FAT-fs (loop3): Filesystem has been set read-only [ 295.281301][T11083] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:12 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 22:46:12 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:12 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x144) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000300)={0xd23, &(0x7f00000002c0)=[r2, r0]}, 0x2) 22:46:13 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 22:46:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:13 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) 22:46:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 22:46:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:13 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:13 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) [ 296.383658][T11145] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 296.392518][T11145] FAT-fs (loop3): Filesystem has been set read-only [ 296.400869][T11145] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 296.410802][T11145] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 296.420211][T11145] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:13 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 296.757092][T11122] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:14 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000080)=""/212) 22:46:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:14 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:14 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 22:46:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) 22:46:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 22:46:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 22:46:14 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 297.885190][T11215] EXT4-fs: 18 callbacks suppressed [ 297.885203][T11215] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 297.900664][T11215] EXT4-fs (sda1): Ignoring removed bh option [ 297.907315][T11215] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 297.907315][T11215] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 297.907315][T11215] 22:46:15 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:15 executing program 1: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 22:46:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 297.988209][T11215] EXT4-fs (sda1): re-mounted. Opts: data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=, 22:46:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:15 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:15 executing program 1: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 298.960845][T11267] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 298.969929][T11267] FAT-fs (loop3): Filesystem has been set read-only [ 298.977558][T11267] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:16 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:16 executing program 1: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:16 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) [ 299.088040][T11232] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:16 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:16 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:16 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:16 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:16 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:17 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:17 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:17 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:17 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:17 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:17 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:18 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x4) 22:46:18 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) 22:46:18 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:18 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) 22:46:19 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:19 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:19 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) 22:46:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:19 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)) 22:46:19 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) [ 302.964752][T11436] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 302.973675][T11436] FAT-fs (loop3): Filesystem has been set read-only [ 302.982539][T11436] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 302.991946][T11436] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 303.001150][T11436] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) 22:46:20 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 303.434903][T11420] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:21 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:21 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:21 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 304.208956][T11495] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 304.218069][T11495] FAT-fs (loop3): Filesystem has been set read-only [ 304.228643][T11495] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 304.238576][T11495] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 304.247634][T11495] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) [ 304.681171][T11478] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:22 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:22 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:22 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:22 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:23 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:23 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:23 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:24 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:25 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:25 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:26 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:26 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:26 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:26 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:26 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:27 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:27 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:27 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:28 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) 22:46:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 311.073395][T11710] EXT4-fs (sda1): re-mounted. Opts: 22:46:28 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:28 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:28 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) [ 311.714794][T11740] EXT4-fs (sda1): re-mounted. Opts: 22:46:29 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:29 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:29 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) 22:46:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 312.391015][T11757] EXT4-fs (sda1): re-mounted. Opts: 22:46:29 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) 22:46:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:29 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) [ 312.795443][T11784] EXT4-fs (sda1): re-mounted. Opts: 22:46:30 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe13034ee59f96d985cded3c6269037c5313392bae6826a06e652f323a970e42428f3c80b0ec21e2bfc1c29d0c6e8c07c0b9ee333e99375882ccc7b31f8f175fbaa1d5a17332adea11d110395abcb9bdcb5608c4edf5991abe5c4646007b0c7e8287c121607aff577e6db5f45163a01621fe5fd8e73d2408613b05fc8f05a742f5b9d4297d87c32a0e55fb46d738ed68"]) 22:46:30 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) 22:46:30 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:30 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 313.378930][T11807] EXT4-fs (sda1): re-mounted. Opts: 22:46:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:31 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) 22:46:31 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) [ 314.036301][T11839] EXT4-fs (sda1): re-mounted. Opts: [ 314.139845][T11844] EXT4-fs (sda1): re-mounted. Opts: 22:46:31 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) 22:46:31 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 314.283187][T11851] EXT4-fs (sda1): re-mounted. Opts: 22:46:31 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 314.321450][T11855] EXT4-fs (sda1): re-mounted. Opts: 22:46:31 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) 22:46:31 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 314.740083][T11868] EXT4-fs (sda1): re-mounted. Opts: 22:46:32 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:32 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) 22:46:33 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) 22:46:33 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 22:46:33 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:33 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:33 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe1303"]) [ 316.104449][T11916] EXT4-fs: 3 callbacks suppressed [ 316.104462][T11916] EXT4-fs (sda1): re-mounted. Opts: 22:46:33 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[]) [ 316.368595][T11938] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 316.618305][T11938] EXT4-fs (sda1): Ignoring removed bh option 22:46:33 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 316.674271][T11938] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 316.674271][T11938] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 316.674271][T11938] [ 316.978152][T11938] EXT4-fs (sda1): re-mounted. Opts: data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=, 22:46:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 317.103838][T11948] EXT4-fs (sda1): re-mounted. Opts: [ 317.123858][T11955] EXT4-fs (sda1): re-mounted. Opts: 22:46:34 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:34 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe1303"]) [ 317.219681][T11919] dccp_close: ABORT with 20 bytes unread 22:46:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:34 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:34 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 317.573900][T11983] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 317.607104][T11983] EXT4-fs (sda1): Ignoring removed bh option [ 317.617975][T11983] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 317.617975][T11983] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 317.617975][T11983] [ 317.726504][T11990] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 317.735381][T11990] FAT-fs (loop2): Filesystem has been set read-only [ 317.743488][T11990] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 317.754388][T11990] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 317.764160][T11990] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:35 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:35 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:35 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:35 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 318.259602][T11974] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:35 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:35 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:36 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:36 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:36 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:36 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:37 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880dc6216e35a7f7bc025d5f760127ce0408c685b7034da336028b5820367274d92e35f6c25576ca8e7c0f02e077c28d94e441a2be7fcbbb76c6eef37ba9e00bddef800618fe1303"]) 22:46:37 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:37 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880d"]) 22:46:37 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:37 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 320.323342][T12096] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 320.333294][T12096] FAT-fs (loop3): Filesystem has been set read-only [ 320.341500][T12096] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 320.351220][T12096] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 320.360534][T12096] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:37 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:46:37 executing program 4: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:37 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 320.765797][T12073] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:38 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:38 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:46:38 executing program 4: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:38 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 321.149612][T12140] EXT4-fs: 20 callbacks suppressed [ 321.149623][T12140] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 321.359750][T12154] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 321.363153][T12155] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 321.369050][T12154] FAT-fs (loop2): Filesystem has been set read-only [ 321.376114][T12155] FAT-fs (loop3): Filesystem has been set read-only [ 321.383155][T12154] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 321.390267][T12155] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:38 executing program 4: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:38 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) [ 321.579513][T12162] EXT4-fs (sda1): re-mounted. Opts: 22:46:39 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 321.670996][T12169] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 22:46:39 executing program 4: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:39 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb4355a841c682577149642f5078ccb0b7880d"]) 22:46:39 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) 22:46:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 321.945489][T12180] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 322.009951][T12180] EXT4-fs (sda1): Ignoring removed bh option [ 322.016581][T12180] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 322.016581][T12180] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 322.016581][T12180] 22:46:39 executing program 4: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 322.078517][T12180] EXT4-fs (sda1): re-mounted. Opts: data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=, [ 322.101102][T12187] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 322.115589][T12187] EXT4-fs (sda1): Ignoring removed bh option [ 322.121875][T12187] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 322.121875][T12187] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 322.121875][T12187] 22:46:39 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) 22:46:39 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:46:39 executing program 4: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:40 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) 22:46:40 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:46:40 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:40 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 323.067361][T12235] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 323.077542][T12235] FAT-fs (loop2): Filesystem has been set read-only [ 323.086976][T12235] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 323.097240][T12235] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 323.106907][T12235] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 323.262233][T12203] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:40 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb43"]) 22:46:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:40 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 22:46:40 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:41 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) [ 323.926920][T12281] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 323.935744][T12281] FAT-fs (loop2): Filesystem has been set read-only [ 323.943729][T12281] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 323.952978][T12281] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:41 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) 22:46:41 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 323.970777][T12281] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:41 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:41 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:41 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) 22:46:41 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) [ 324.390464][T12265] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:41 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:41 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:42 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,gr']) 22:46:42 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) 22:46:42 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:42 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:42 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 325.124679][T12343] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 325.132774][T12343] FAT-fs (loop3): Filesystem has been set read-only [ 325.139970][T12343] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:42 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c62682c6a71666d743d76667376302c6e6f61636c2c6772706a71756f74613d2c00da5d490734aafb43"]) 22:46:42 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=,\x00']) 22:46:42 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:42 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:42 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) 22:46:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:43 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:43 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:43 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:43 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) 22:46:43 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:43 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 326.764263][T12416] EXT4-fs: 56 callbacks suppressed [ 326.764277][T12416] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 326.817500][T12416] EXT4-fs (sda1): Ignoring removed bh option [ 326.823754][T12416] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 326.823754][T12416] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 326.823754][T12416] [ 326.843912][T12416] EXT4-fs (sda1): Unrecognized mount option "grpj" or missing value [ 326.906956][T12418] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 326.937176][T12418] EXT4-fs (sda1): Ignoring removed bh option [ 326.943588][T12418] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 326.943588][T12418] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 326.943588][T12418] [ 326.962428][T12418] EXT4-fs (sda1): Unrecognized mount option "grp" or missing value 22:46:44 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:44 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:44 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grp']) 22:46:45 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:45 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:45 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 328.123544][T12459] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 328.270169][T12459] EXT4-fs (sda1): Ignoring removed bh option 22:46:45 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:45 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:45 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=,\x00']) [ 328.522466][T12489] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 328.531329][T12489] FAT-fs (loop3): Filesystem has been set read-only [ 328.540131][T12489] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 328.549623][T12489] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 328.559256][T12489] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:46 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:46 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:46 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 329.101891][T12480] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 22:46:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:46 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:46 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) 22:46:46 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:46 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:47 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:47 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, 0x0) 22:46:47 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=']) 22:46:48 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:49 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpj']) 22:46:49 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 331.967731][T12618] EXT4-fs: 31 callbacks suppressed [ 331.967744][T12618] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 331.990076][T12618] EXT4-fs (sda1): Ignoring removed bh option [ 331.999710][T12618] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 331.999710][T12618] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 331.999710][T12618] [ 332.017758][T12618] EXT4-fs (sda1): Unrecognized mount option "grpjquot" or missing value 22:46:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:49 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:49 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) [ 332.738063][T12635] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 332.797003][T12635] EXT4-fs (sda1): Ignoring removed bh option [ 332.836606][T12635] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 332.836606][T12635] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 332.836606][T12635] [ 333.116779][T12635] EXT4-fs (sda1): Unrecognized mount option "grpjquot" or missing value 22:46:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:50 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:50 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 335.652081][T12670] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 335.669187][T12670] EXT4-fs (sda1): Ignoring removed bh option 22:46:53 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) [ 336.134195][T12693] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 336.143424][T12693] FAT-fs (loop4): Filesystem has been set read-only [ 336.152767][T12693] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 336.163014][T12693] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 336.178741][T12693] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 22:46:53 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) [ 336.661561][T12683] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) 22:46:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:54 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 337.086379][T12714] EXT4-fs: 10 callbacks suppressed [ 337.086392][T12714] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 337.137751][T12714] EXT4-fs (sda1): Ignoring removed bh option 22:46:54 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) [ 337.199720][T12714] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 337.199720][T12714] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 337.199720][T12714] [ 337.410544][T12714] EXT4-fs (sda1): Unrecognized mount option "grpjquot" or missing value 22:46:55 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:55 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 338.073153][T12745] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 22:46:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 338.258616][T12745] EXT4-fs (sda1): Ignoring removed bh option [ 338.346260][T12745] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 338.346260][T12745] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 338.346260][T12745] [ 338.364860][T12745] EXT4-fs (sda1): Unrecognized mount option "grpjquota" or missing value 22:46:56 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) 22:46:56 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:56 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:56 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota=']) 22:46:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 339.723100][T12791] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 339.795180][T12791] EXT4-fs (sda1): Ignoring removed bh option 22:46:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:57 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:57 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) [ 340.471096][T12826] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 340.480249][T12826] FAT-fs (loop2): Filesystem has been set read-only [ 340.489136][T12826] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 340.506382][T12826] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 340.515862][T12826] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) [ 340.704716][T12830] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 340.714047][T12830] FAT-fs (loop3): Filesystem has been set read-only [ 340.723296][T12830] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 22:46:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) [ 340.839081][T12809] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 22:46:58 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:58 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 341.290997][T12824] dccp_close: ABORT with 20 bytes unread 22:46:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquot']) 22:46:59 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) 22:46:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:46:59 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:46:59 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 342.774999][T12892] EXT4-fs: 18 callbacks suppressed [ 342.775013][T12892] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 342.940502][T12892] EXT4-fs (sda1): Ignoring removed bh option [ 343.044411][T12913] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 343.052690][T12913] FAT-fs (loop4): Filesystem has been set read-only [ 343.060236][T12913] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000500) [ 343.099949][T12892] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 343.099949][T12892] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 343.099949][T12892] 22:47:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 343.176336][T12892] EXT4-fs (sda1): Unrecognized mount option "grpjquota" or missing value 22:47:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) 22:47:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:01 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 343.944766][T12929] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 344.016671][T12929] EXT4-fs (sda1): Ignoring removed bh option [ 344.046103][T12929] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 344.046103][T12929] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 344.046103][T12929] [ 344.132120][T12929] EXT4-fs (sda1): Unrecognized mount option "grpjquota" or missing value 22:47:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:01 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) 22:47:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 344.699955][T12954] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 344.711237][T12954] EXT4-fs (sda1): Ignoring removed bh option 22:47:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:02 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r2, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:02 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x2210022, &(0x7f0000000140)=ANY=[@ANYBLOB='data=journal,bh,jqfmt=vfsv0,noacl,grpjquota']) 22:47:03 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) listen(r1, 0x6) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:04 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r3, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r6 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r7, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:04 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r2, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:05 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r2, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="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", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) 22:47:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, 0x0, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="000637620003555e5688911b59672a01008a01d85a4d5e64bd9837a162"], 0x1d) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x399b}, 0x16, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 22:47:06 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getpid() getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0xb, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r2, 0x0, r3, 0x0) listen(r1, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000880)="54f34d7a998ce47ecd5d96208692010576b44ae884c66b3155db4ad302bfdbffd4e6663aaa888b258f1d6205a02627569aea899aa4813fdbd09357b1418c0b857d4232c1b087dbb8c5489dbc889385d95381027da86f2b29a0f20535f283cfbf04720609407660626097e7305c6a340240a99ca9e18f35488c301f9ac03eeea9db6746e6782f15f4e8dbf7f2e63f97ff5b88ade59624248175ee24885d27a1908ec44aa3cfa37f0619adb7e0b69c70e679195fb2173c1490d33b67d5147d37c535c8de4ce72c1227bc10c3c323b4bb7bcd6c7e1739cd9a5b89deb2d9de59fe289d246d06971929979d68b0528b0c968026fbfb2d745b1801295bb9f2b1dd5d", 0xff}, {&(0x7f0000000980)="557948d8249dbed515266aad464150b1680eb31d9b394f6daae18026e235112b167f6fcca16800e364e2ed8dfa16e5aac0cd82d6cfcecb1e9f8f8131d87c20168b15f12c5942d6406c8003d5fede75782370ebbf7a76009a647e130c0a0971ae53905b3efffa753b4dbd7a84d4881c7057f15ef4", 0x74}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x3}}], 0x2, 0x0) r6 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r6, &(0x7f00000001c0)="07b3e2610ecd6405704f33ebac67201023bf00a4298c434a531df16dbb65b06a4888421d1d8ac8360525f53c4490506f221f50ebecf91adcd2360d0dcec6995d2178813cbc6ab5bad7af08a861c3855699a37f78121c6b450ea5358640e511d5723322", 0x63, 0x4004000, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x800, @dev={0xfe, 0x80, [], 0x2b}, 0x40}}}, 0x80) [ 454.176153][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 454.183066][ C1] rcu: 1-...!: (1 GPs behind) idle=35a/1/0x4000000000000002 softirq=27099/27142 fqs=19 [ 454.193495][ C1] (t=10500 jiffies g=21001 q=365) [ 454.198621][ C1] rcu: rcu_preempt kthread starved for 10460 jiffies! g21001 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 454.209813][ C1] rcu: RCU grace-period kthread stack dump: [ 454.215811][ C1] rcu_preempt R running task 29264 10 2 0x80004000 [ 454.223727][ C1] Call Trace: [ 454.227134][ C1] __schedule+0x934/0x1f90 [ 454.231584][ C1] ? __sched_text_start+0x8/0x8 [ 454.236498][ C1] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 454.242501][ C1] ? schedule_timeout+0x47c/0xc50 [ 454.247610][ C1] ? lockdep_hardirqs_on+0x421/0x5e0 [ 454.253029][ C1] schedule+0xdc/0x2b0 [ 454.257127][ C1] schedule_timeout+0x486/0xc50 [ 454.261984][ C1] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 454.267924][ C1] ? usleep_range+0x170/0x170 [ 454.272714][ C1] ? trace_hardirqs_on+0x67/0x240 [ 454.277974][ C1] ? __next_timer_interrupt+0x1a0/0x1a0 [ 454.283607][ C1] ? swake_up_one+0x60/0x60 [ 454.288323][ C1] rcu_gp_kthread+0xa10/0x1940 [ 454.293123][ C1] ? rcu_note_context_switch+0x1980/0x1980 [ 454.298945][ C1] ? trace_hardirqs_on+0x67/0x240 [ 454.304121][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 454.310436][ C1] ? __kthread_parkme+0x108/0x1c0 [ 454.315741][ C1] ? __kasan_check_read+0x11/0x20 [ 454.320795][ C1] kthread+0x361/0x430 [ 454.324881][ C1] ? rcu_note_context_switch+0x1980/0x1980 [ 454.330804][ C1] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 454.336640][ C1] ret_from_fork+0x24/0x30 [ 454.341093][ C1] NMI backtrace for cpu 1 [ 454.345428][ C1] CPU: 1 PID: 13048 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 [ 454.354146][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.364213][ C1] Call Trace: [ 454.367498][ C1] [ 454.370472][ C1] dump_stack+0x197/0x210 [ 454.374829][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 454.380304][ C1] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 454.386646][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 454.392653][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 454.398566][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 454.403730][ C1] rcu_sched_clock_irq.cold+0x51a/0xc37 [ 454.409467][ C1] ? raise_softirq+0x138/0x340 [ 454.414259][ C1] update_process_times+0x2d/0x70 [ 454.419380][ C1] tick_sched_handle+0xa2/0x190 [ 454.424243][ C1] tick_sched_timer+0x53/0x140 [ 454.429047][ C1] __hrtimer_run_queues+0x364/0xe40 [ 454.434277][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 454.439756][ C1] ? hrtimer_init+0x330/0x330 [ 454.444442][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 454.450186][ C1] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 454.456278][ C1] hrtimer_interrupt+0x314/0x770 [ 454.461256][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 454.466824][ C1] apic_timer_interrupt+0xf/0x20 [ 454.471767][ C1] [ 454.474722][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 454.481231][ C1] Code: 00 00 00 00 55 48 89 e5 65 48 8b 04 25 c0 1e 02 00 65 8b 15 64 90 8c 7e 81 e2 00 01 1f 00 48 8b 75 08 75 2b 8b 90 80 13 00 00 <83> fa 02 75 20 48 8b 88 88 13 00 00 8b 80 84 13 00 00 48 8b 11 48 [ 454.500995][ C1] RSP: 0018:ffffc90004d571b8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 454.509423][ C1] RAX: ffff88804a6263c0 RBX: ffffc90004d572a8 RCX: ffffc900028c9000 [ 454.517525][ C1] RDX: 0000000000000002 RSI: ffffffff87eb1dac RDI: ffffc90004d572a8 [ 454.525625][ C1] RBP: ffffc90004d571b8 R08: ffff88804a6263c0 R09: ffffed1015d2707c [ 454.533607][ C1] R10: ffffed1015d2707b R11: ffff8880ae9383db R12: ffff888093879642 [ 454.541783][ C1] R13: ffff888093879640 R14: 0000000000000000 R15: 0000000000000000 [ 454.549874][ C1] ? xas_descend+0x1c/0x370 [ 454.554414][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.560668][ C1] xas_descend+0x1c/0x370 [ 454.565018][ C1] xas_load+0xef/0x150 [ 454.569175][ C1] find_get_entry+0x144/0x7a0 [ 454.573864][ C1] ? add_to_page_cache_lru+0x790/0x790 [ 454.579440][ C1] ? trace_hardirqs_on_caller+0x6a/0x240 [ 454.585117][ C1] pagecache_get_page+0x4c/0x9f0 [ 454.590070][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 454.595630][ C1] grab_cache_page_write_begin+0x75/0xb0 [ 454.601382][ C1] ext4_da_write_begin+0x33b/0xc70 [ 454.606519][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.612782][ C1] ? ext4_write_begin+0xdc0/0xdc0 [ 454.617936][ C1] ? copyin+0x150/0x150 [ 454.626077][ C1] ? current_time+0xa8/0x110 [ 454.630702][ C1] generic_perform_write+0x23b/0x540 [ 454.636188][ C1] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 454.644282][ C1] ? file_modified+0x85/0xa0 [ 454.649070][ C1] ext4_buffered_write_iter+0x1fe/0x460 [ 454.654646][ C1] ext4_file_write_iter+0x1fe/0x14e0 [ 454.660062][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 454.665616][ C1] ? __this_cpu_preempt_check+0x35/0x190 [ 454.671254][ C1] ? retint_kernel+0x2b/0x2b [ 454.675878][ C1] ? ext4_buffered_write_iter+0x460/0x460 [ 454.681737][ C1] do_iter_readv_writev+0x5f8/0x8f0 [ 454.687914][ C1] ? no_seek_end_llseek_size+0x70/0x70 [ 454.693402][ C1] ? rw_verify_area+0x126/0x360 [ 454.698274][ C1] do_iter_write+0x184/0x610 [ 454.702901][ C1] ? __kmalloc+0x608/0x770 [ 454.707330][ C1] vfs_iter_write+0x77/0xb0 [ 454.711920][ C1] iter_file_splice_write+0x717/0xc10 [ 454.717335][ C1] ? page_cache_pipe_buf_release+0x290/0x290 [ 454.723386][ C1] ? rw_verify_area+0x126/0x360 [ 454.728253][ C1] ? page_cache_pipe_buf_release+0x290/0x290 [ 454.734363][ C1] direct_splice_actor+0x123/0x190 [ 454.739501][ C1] splice_direct_to_actor+0x3b4/0xa30 [ 454.744907][ C1] ? generic_pipe_buf_nosteal+0x10/0x10 [ 454.750500][ C1] ? do_splice_to+0x180/0x180 [ 454.755217][ C1] ? rw_verify_area+0x126/0x360 [ 454.760089][ C1] do_splice_direct+0x1da/0x2a0 [ 454.764956][ C1] ? splice_direct_to_actor+0xa30/0xa30 [ 454.770510][ C1] ? rcu_read_lock_any_held+0xcd/0xf0 [ 454.775998][ C1] ? __this_cpu_preempt_check+0x35/0x190 [ 454.781640][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.787894][ C1] ? __sb_start_write+0x1e5/0x460 [ 454.793060][ C1] do_sendfile+0x597/0xd00 [ 454.797508][ C1] ? do_compat_pwritev64+0x1c0/0x1c0 [ 454.802821][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.809262][ C1] ? _copy_from_user+0x12c/0x1a0 [ 454.814228][ C1] __x64_sys_sendfile64+0x15a/0x220 [ 454.819443][ C1] ? __ia32_sys_sendfile+0x230/0x230 [ 454.824816][ C1] ? do_syscall_64+0xc0/0x790 [ 454.829518][ C1] do_syscall_64+0xfa/0x790 [ 454.834202][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.840138][ C1] RIP: 0033:0x45c6c9 [ 454.844054][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.863674][ C1] RSP: 002b:00007f2fc2051c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 454.872111][ C1] RAX: ffffffffffffffda RBX: 00007f2fc20526d4 RCX: 000000000045c6c9 [ 454.880097][ C1] RDX: 00000000200001c0 RSI: 0000000000000005 RDI: 0000000000000005 [ 454.888076][ C1] RBP: 000000000076c070 R08: 0000000000000000 R09: 0000000000000000 [ 454.896180][ C1] R10: 00008080fffffffe R11: 0000000000000246 R12: 00000000ffffffff [ 454.904163][ C1] R13: 00000000000008cb R14: 00000000004cb58f R15: 000000000076c07c