Warning: Permanently added '[localhost]:38453' (ECDSA) to the list of known hosts. 2023/01/27 20:33:45 fuzzer started 2023/01/27 20:33:46 dialing manager at localhost:39545 [ 57.191213][ T5138] cgroup: Unknown subsys name 'net' [ 57.345133][ T5138] cgroup: Unknown subsys name 'rlimit' 2023/01/27 20:33:46 syscalls: 3840 2023/01/27 20:33:46 code coverage: enabled 2023/01/27 20:33:46 comparison tracing: enabled 2023/01/27 20:33:46 extra coverage: enabled 2023/01/27 20:33:46 delay kcov mmap: enabled 2023/01/27 20:33:46 setuid sandbox: enabled 2023/01/27 20:33:46 namespace sandbox: enabled 2023/01/27 20:33:46 Android sandbox: /sys/fs/selinux/policy does not exist 2023/01/27 20:33:46 fault injection: enabled 2023/01/27 20:33:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/01/27 20:33:46 net packet injection: enabled 2023/01/27 20:33:46 net device setup: enabled 2023/01/27 20:33:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2023/01/27 20:33:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/01/27 20:33:46 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/01/27 20:33:46 USB emulation: enabled 2023/01/27 20:33:46 hci packet injection: enabled 2023/01/27 20:33:46 wifi device emulation: enabled 2023/01/27 20:33:46 802.15.4 emulation: enabled 2023/01/27 20:33:46 fetching corpus: 0, signal 0/2000 (executing program) 2023/01/27 20:33:46 fetching corpus: 50, signal 36555/40371 (executing program) 2023/01/27 20:33:47 fetching corpus: 100, signal 61180/66704 (executing program) 2023/01/27 20:33:47 fetching corpus: 150, signal 72944/80223 (executing program) 2023/01/27 20:33:47 fetching corpus: 200, signal 88234/97161 (executing program) 2023/01/27 20:33:47 fetching corpus: 250, signal 95612/106207 (executing program) 2023/01/27 20:33:48 fetching corpus: 300, signal 100871/113125 (executing program) 2023/01/27 20:33:48 fetching corpus: 350, signal 110157/123964 (executing program) 2023/01/27 20:33:48 fetching corpus: 400, signal 115646/131036 (executing program) 2023/01/27 20:33:48 fetching corpus: 450, signal 122129/139060 (executing program) 2023/01/27 20:33:48 fetching corpus: 500, signal 130490/148852 (executing program) 2023/01/27 20:33:49 fetching corpus: 550, signal 134739/154594 (executing program) 2023/01/27 20:33:49 fetching corpus: 600, signal 139724/161071 (executing program) 2023/01/27 20:33:49 fetching corpus: 650, signal 143959/166821 (executing program) 2023/01/27 20:33:49 fetching corpus: 700, signal 152229/176395 (executing program) 2023/01/27 20:33:50 fetching corpus: 750, signal 161455/186844 (executing program) 2023/01/27 20:33:50 fetching corpus: 800, signal 165170/192000 (executing program) 2023/01/27 20:33:50 fetching corpus: 850, signal 169720/197881 (executing program) 2023/01/27 20:33:50 fetching corpus: 900, signal 173917/203473 (executing program) 2023/01/27 20:33:50 fetching corpus: 950, signal 177373/208303 (executing program) 2023/01/27 20:33:51 fetching corpus: 1000, signal 180349/212688 (executing program) 2023/01/27 20:33:51 fetching corpus: 1050, signal 183063/216775 (executing program) 2023/01/27 20:33:51 fetching corpus: 1100, signal 185553/220646 (executing program) 2023/01/27 20:33:51 fetching corpus: 1150, signal 187649/224133 (executing program) 2023/01/27 20:33:51 fetching corpus: 1200, signal 189522/227424 (executing program) 2023/01/27 20:33:52 fetching corpus: 1250, signal 192158/231375 (executing program) 2023/01/27 20:33:52 fetching corpus: 1300, signal 194085/234686 (executing program) 2023/01/27 20:33:52 fetching corpus: 1350, signal 196691/238618 (executing program) 2023/01/27 20:33:52 fetching corpus: 1400, signal 198469/241810 (executing program) 2023/01/27 20:33:52 fetching corpus: 1450, signal 201401/246022 (executing program) 2023/01/27 20:33:52 fetching corpus: 1500, signal 204432/250301 (executing program) 2023/01/27 20:33:53 fetching corpus: 1550, signal 207848/254938 (executing program) 2023/01/27 20:33:53 fetching corpus: 1600, signal 210977/259266 (executing program) 2023/01/27 20:33:53 fetching corpus: 1650, signal 213401/262868 (executing program) 2023/01/27 20:33:54 fetching corpus: 1700, signal 215561/266299 (executing program) 2023/01/27 20:33:54 fetching corpus: 1750, signal 217078/269135 (executing program) 2023/01/27 20:33:54 fetching corpus: 1800, signal 219640/272908 (executing program) 2023/01/27 20:33:54 fetching corpus: 1850, signal 221822/276348 (executing program) 2023/01/27 20:33:54 fetching corpus: 1900, signal 223690/279481 (executing program) 2023/01/27 20:33:55 fetching corpus: 1950, signal 226207/283196 (executing program) 2023/01/27 20:33:55 fetching corpus: 2000, signal 227984/286236 (executing program) 2023/01/27 20:33:55 fetching corpus: 2050, signal 230462/289873 (executing program) 2023/01/27 20:33:55 fetching corpus: 2100, signal 232075/292745 (executing program) 2023/01/27 20:33:55 fetching corpus: 2150, signal 233761/295680 (executing program) 2023/01/27 20:33:56 fetching corpus: 2200, signal 235732/298800 (executing program) 2023/01/27 20:33:56 fetching corpus: 2250, signal 239064/303152 (executing program) 2023/01/27 20:33:56 fetching corpus: 2300, signal 241250/306467 (executing program) 2023/01/27 20:33:56 fetching corpus: 2350, signal 242946/309359 (executing program) 2023/01/27 20:33:56 fetching corpus: 2400, signal 244713/312283 (executing program) 2023/01/27 20:33:57 fetching corpus: 2450, signal 246714/315392 (executing program) 2023/01/27 20:33:57 fetching corpus: 2500, signal 250781/320300 (executing program) 2023/01/27 20:33:57 fetching corpus: 2550, signal 253085/323704 (executing program) 2023/01/27 20:33:57 fetching corpus: 2600, signal 254434/326259 (executing program) 2023/01/27 20:33:57 fetching corpus: 2650, signal 256676/329592 (executing program) 2023/01/27 20:33:58 fetching corpus: 2700, signal 259807/333589 (executing program) 2023/01/27 20:33:58 fetching corpus: 2750, signal 261799/336630 (executing program) 2023/01/27 20:33:58 fetching corpus: 2800, signal 263882/339755 (executing program) 2023/01/27 20:33:58 fetching corpus: 2850, signal 266314/343205 (executing program) 2023/01/27 20:33:58 fetching corpus: 2900, signal 267356/345419 (executing program) 2023/01/27 20:33:59 fetching corpus: 2950, signal 269436/348477 (executing program) 2023/01/27 20:33:59 fetching corpus: 3000, signal 270974/351122 (executing program) 2023/01/27 20:33:59 fetching corpus: 3050, signal 272638/353866 (executing program) 2023/01/27 20:33:59 fetching corpus: 3100, signal 275229/357351 (executing program) 2023/01/27 20:34:00 fetching corpus: 3150, signal 276921/360060 (executing program) 2023/01/27 20:34:00 fetching corpus: 3200, signal 278605/362741 (executing program) 2023/01/27 20:34:00 fetching corpus: 3250, signal 279922/365098 (executing program) 2023/01/27 20:34:00 fetching corpus: 3300, signal 280955/367281 (executing program) 2023/01/27 20:34:01 fetching corpus: 3350, signal 282646/370008 (executing program) 2023/01/27 20:34:01 fetching corpus: 3400, signal 283676/372162 (executing program) 2023/01/27 20:34:01 fetching corpus: 3450, signal 285537/374932 (executing program) 2023/01/27 20:34:01 fetching corpus: 3500, signal 286543/377070 (executing program) 2023/01/27 20:34:01 fetching corpus: 3550, signal 287995/379599 (executing program) 2023/01/27 20:34:02 fetching corpus: 3600, signal 289284/381883 (executing program) 2023/01/27 20:34:02 fetching corpus: 3650, signal 290568/384186 (executing program) 2023/01/27 20:34:02 fetching corpus: 3700, signal 292214/386781 (executing program) 2023/01/27 20:34:02 fetching corpus: 3750, signal 293734/389242 (executing program) 2023/01/27 20:34:03 fetching corpus: 3800, signal 294884/391427 (executing program) 2023/01/27 20:34:03 fetching corpus: 3850, signal 296319/393847 (executing program) 2023/01/27 20:34:03 fetching corpus: 3900, signal 297256/395834 (executing program) 2023/01/27 20:34:03 fetching corpus: 3950, signal 298194/397832 (executing program) 2023/01/27 20:34:03 fetching corpus: 4000, signal 299300/399974 (executing program) 2023/01/27 20:34:04 fetching corpus: 4050, signal 300504/402184 (executing program) 2023/01/27 20:34:04 fetching corpus: 4100, signal 301414/404139 (executing program) 2023/01/27 20:34:04 fetching corpus: 4150, signal 302807/406491 (executing program) 2023/01/27 20:34:04 fetching corpus: 4200, signal 304130/408756 (executing program) 2023/01/27 20:34:04 fetching corpus: 4250, signal 304893/410560 (executing program) 2023/01/27 20:34:05 fetching corpus: 4300, signal 306541/413042 (executing program) 2023/01/27 20:34:05 fetching corpus: 4350, signal 307870/415273 (executing program) 2023/01/27 20:34:05 fetching corpus: 4400, signal 308740/417176 (executing program) 2023/01/27 20:34:05 fetching corpus: 4450, signal 309715/419147 (executing program) 2023/01/27 20:34:05 fetching corpus: 4500, signal 310276/420789 (executing program) 2023/01/27 20:34:06 fetching corpus: 4550, signal 311536/422945 (executing program) [ 77.056455][ T1321] ieee802154 phy0 wpan0: encryption failed: -22 [ 77.061837][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/27 20:34:06 fetching corpus: 4600, signal 312823/425123 (executing program) 2023/01/27 20:34:06 fetching corpus: 4650, signal 313352/426730 (executing program) 2023/01/27 20:34:06 fetching corpus: 4700, signal 314589/428869 (executing program) 2023/01/27 20:34:06 fetching corpus: 4750, signal 315574/430808 (executing program) 2023/01/27 20:34:07 fetching corpus: 4800, signal 316383/432601 (executing program) 2023/01/27 20:34:07 fetching corpus: 4850, signal 317446/434616 (executing program) 2023/01/27 20:34:07 fetching corpus: 4900, signal 318521/436632 (executing program) 2023/01/27 20:34:07 fetching corpus: 4950, signal 319263/438409 (executing program) 2023/01/27 20:34:08 fetching corpus: 5000, signal 320401/440445 (executing program) 2023/01/27 20:34:08 fetching corpus: 5050, signal 321241/442289 (executing program) 2023/01/27 20:34:08 fetching corpus: 5100, signal 322773/444619 (executing program) 2023/01/27 20:34:08 fetching corpus: 5150, signal 323968/446627 (executing program) 2023/01/27 20:34:08 fetching corpus: 5200, signal 325011/448545 (executing program) 2023/01/27 20:34:08 fetching corpus: 5250, signal 326203/450616 (executing program) 2023/01/27 20:34:09 fetching corpus: 5300, signal 327262/452550 (executing program) 2023/01/27 20:34:09 fetching corpus: 5350, signal 328426/454576 (executing program) 2023/01/27 20:34:09 fetching corpus: 5400, signal 329260/456330 (executing program) 2023/01/27 20:34:09 fetching corpus: 5450, signal 330472/458402 (executing program) 2023/01/27 20:34:10 fetching corpus: 5500, signal 331197/460065 (executing program) 2023/01/27 20:34:10 fetching corpus: 5550, signal 332503/462186 (executing program) 2023/01/27 20:34:10 fetching corpus: 5600, signal 333413/464021 (executing program) 2023/01/27 20:34:11 fetching corpus: 5650, signal 334171/465719 (executing program) 2023/01/27 20:34:11 fetching corpus: 5700, signal 335105/467532 (executing program) 2023/01/27 20:34:12 fetching corpus: 5750, signal 336678/469764 (executing program) 2023/01/27 20:34:12 fetching corpus: 5800, signal 337763/471679 (executing program) 2023/01/27 20:34:12 fetching corpus: 5850, signal 338419/473302 (executing program) 2023/01/27 20:34:13 fetching corpus: 5900, signal 339182/474980 (executing program) 2023/01/27 20:34:13 fetching corpus: 5950, signal 340344/476898 (executing program) 2023/01/27 20:34:13 fetching corpus: 6000, signal 341867/479062 (executing program) 2023/01/27 20:34:14 fetching corpus: 6050, signal 342571/480697 (executing program) 2023/01/27 20:34:14 fetching corpus: 6100, signal 343263/482307 (executing program) 2023/01/27 20:34:14 fetching corpus: 6150, signal 344281/484113 (executing program) 2023/01/27 20:34:14 fetching corpus: 6200, signal 345286/485902 (executing program) 2023/01/27 20:34:15 fetching corpus: 6250, signal 346304/487686 (executing program) 2023/01/27 20:34:15 fetching corpus: 6300, signal 347609/489643 (executing program) 2023/01/27 20:34:16 fetching corpus: 6350, signal 348777/491559 (executing program) 2023/01/27 20:34:16 fetching corpus: 6400, signal 349874/493389 (executing program) [ 87.319697][ T943] cfg80211: failed to load regulatory.db 2023/01/27 20:34:16 fetching corpus: 6450, signal 350906/495216 (executing program) 2023/01/27 20:34:16 fetching corpus: 6500, signal 352260/497208 (executing program) 2023/01/27 20:34:17 fetching corpus: 6550, signal 352984/498810 (executing program) 2023/01/27 20:34:17 fetching corpus: 6600, signal 353826/500420 (executing program) 2023/01/27 20:34:17 fetching corpus: 6650, signal 354462/501926 (executing program) 2023/01/27 20:34:17 fetching corpus: 6700, signal 355334/503616 (executing program) 2023/01/27 20:34:18 fetching corpus: 6750, signal 356336/505440 (executing program) 2023/01/27 20:34:18 fetching corpus: 6800, signal 357474/507325 (executing program) 2023/01/27 20:34:18 fetching corpus: 6850, signal 358218/508867 (executing program) 2023/01/27 20:34:18 fetching corpus: 6900, signal 359170/510611 (executing program) 2023/01/27 20:34:18 fetching corpus: 6950, signal 360009/512292 (executing program) 2023/01/27 20:34:19 fetching corpus: 7000, signal 360610/513742 (executing program) 2023/01/27 20:34:19 fetching corpus: 7050, signal 361403/515308 (executing program) 2023/01/27 20:34:19 fetching corpus: 7100, signal 362117/516884 (executing program) 2023/01/27 20:34:20 fetching corpus: 7150, signal 363227/518681 (executing program) 2023/01/27 20:34:20 fetching corpus: 7200, signal 363990/520274 (executing program) 2023/01/27 20:34:20 fetching corpus: 7250, signal 364968/521967 (executing program) 2023/01/27 20:34:20 fetching corpus: 7300, signal 365719/523501 (executing program) 2023/01/27 20:34:20 fetching corpus: 7350, signal 366799/525243 (executing program) 2023/01/27 20:34:20 fetching corpus: 7400, signal 367600/526851 (executing program) 2023/01/27 20:34:20 fetching corpus: 7450, signal 368745/528631 (executing program) 2023/01/27 20:34:21 fetching corpus: 7500, signal 369656/530255 (executing program) 2023/01/27 20:34:21 fetching corpus: 7550, signal 370580/531857 (executing program) 2023/01/27 20:34:21 fetching corpus: 7600, signal 371284/533370 (executing program) 2023/01/27 20:34:21 fetching corpus: 7650, signal 372613/535224 (executing program) 2023/01/27 20:34:22 fetching corpus: 7700, signal 373334/536668 (executing program) 2023/01/27 20:34:22 fetching corpus: 7750, signal 374462/538370 (executing program) 2023/01/27 20:34:22 fetching corpus: 7800, signal 375404/539974 (executing program) 2023/01/27 20:34:22 fetching corpus: 7850, signal 376033/541407 (executing program) 2023/01/27 20:34:23 fetching corpus: 7900, signal 376790/542939 (executing program) 2023/01/27 20:34:23 fetching corpus: 7950, signal 377471/544410 (executing program) 2023/01/27 20:34:23 fetching corpus: 8000, signal 378665/546178 (executing program) 2023/01/27 20:34:23 fetching corpus: 8050, signal 379267/547600 (executing program) 2023/01/27 20:34:23 fetching corpus: 8100, signal 379865/548980 (executing program) 2023/01/27 20:34:24 fetching corpus: 8150, signal 380560/550423 (executing program) 2023/01/27 20:34:24 fetching corpus: 8200, signal 381409/551931 (executing program) 2023/01/27 20:34:24 fetching corpus: 8250, signal 382028/553289 (executing program) 2023/01/27 20:34:24 fetching corpus: 8300, signal 383074/554928 (executing program) 2023/01/27 20:34:24 fetching corpus: 8350, signal 383677/556306 (executing program) 2023/01/27 20:34:25 fetching corpus: 8400, signal 384820/557931 (executing program) 2023/01/27 20:34:25 fetching corpus: 8450, signal 385909/559629 (executing program) 2023/01/27 20:34:25 fetching corpus: 8500, signal 386447/561010 (executing program) 2023/01/27 20:34:25 fetching corpus: 8550, signal 387443/562601 (executing program) 2023/01/27 20:34:25 fetching corpus: 8600, signal 387942/563920 (executing program) 2023/01/27 20:34:25 fetching corpus: 8650, signal 388463/565204 (executing program) 2023/01/27 20:34:26 fetching corpus: 8700, signal 389305/566667 (executing program) 2023/01/27 20:34:26 fetching corpus: 8750, signal 390119/568172 (executing program) 2023/01/27 20:34:26 fetching corpus: 8800, signal 390792/569555 (executing program) 2023/01/27 20:34:26 fetching corpus: 8850, signal 391516/570918 (executing program) 2023/01/27 20:34:27 fetching corpus: 8900, signal 392519/572493 (executing program) 2023/01/27 20:34:27 fetching corpus: 8950, signal 393336/573919 (executing program) 2023/01/27 20:34:27 fetching corpus: 9000, signal 393894/575247 (executing program) 2023/01/27 20:34:27 fetching corpus: 9050, signal 394833/576787 (executing program) 2023/01/27 20:34:28 fetching corpus: 9100, signal 395532/578157 (executing program) 2023/01/27 20:34:28 fetching corpus: 9150, signal 396154/579471 (executing program) 2023/01/27 20:34:28 fetching corpus: 9200, signal 397099/580970 (executing program) 2023/01/27 20:34:29 fetching corpus: 9250, signal 398169/582604 (executing program) 2023/01/27 20:34:29 fetching corpus: 9300, signal 398700/583853 (executing program) 2023/01/27 20:34:29 fetching corpus: 9350, signal 399214/585132 (executing program) 2023/01/27 20:34:29 fetching corpus: 9400, signal 399816/586428 (executing program) 2023/01/27 20:34:29 fetching corpus: 9450, signal 400420/587682 (executing program) 2023/01/27 20:34:30 fetching corpus: 9500, signal 401117/589020 (executing program) 2023/01/27 20:34:30 fetching corpus: 9550, signal 401860/590353 (executing program) 2023/01/27 20:34:30 fetching corpus: 9600, signal 402695/591755 (executing program) 2023/01/27 20:34:30 fetching corpus: 9650, signal 403764/593270 (executing program) 2023/01/27 20:34:31 fetching corpus: 9700, signal 404354/594541 (executing program) 2023/01/27 20:34:31 fetching corpus: 9750, signal 405171/595995 (executing program) 2023/01/27 20:34:31 fetching corpus: 9800, signal 406145/597440 (executing program) 2023/01/27 20:34:31 fetching corpus: 9850, signal 406895/598813 (executing program) 2023/01/27 20:34:32 fetching corpus: 9900, signal 407427/600031 (executing program) 2023/01/27 20:34:32 fetching corpus: 9950, signal 408125/601365 (executing program) 2023/01/27 20:34:32 fetching corpus: 10000, signal 408861/602713 (executing program) 2023/01/27 20:34:32 fetching corpus: 10050, signal 409286/603907 (executing program) 2023/01/27 20:34:32 fetching corpus: 10100, signal 410250/605316 (executing program) 2023/01/27 20:34:33 fetching corpus: 10150, signal 410968/606644 (executing program) 2023/01/27 20:34:33 fetching corpus: 10200, signal 411464/607873 (executing program) 2023/01/27 20:34:33 fetching corpus: 10250, signal 411903/609041 (executing program) 2023/01/27 20:34:33 fetching corpus: 10300, signal 412456/610272 (executing program) 2023/01/27 20:34:34 fetching corpus: 10350, signal 412947/611431 (executing program) 2023/01/27 20:34:34 fetching corpus: 10400, signal 413518/612666 (executing program) 2023/01/27 20:34:34 fetching corpus: 10450, signal 414003/613839 (executing program) 2023/01/27 20:34:34 fetching corpus: 10500, signal 414714/615156 (executing program) 2023/01/27 20:34:34 fetching corpus: 10550, signal 415560/616468 (executing program) 2023/01/27 20:34:35 fetching corpus: 10600, signal 416078/617603 (executing program) 2023/01/27 20:34:35 fetching corpus: 10650, signal 416691/618830 (executing program) 2023/01/27 20:34:35 fetching corpus: 10700, signal 417037/619940 (executing program) 2023/01/27 20:34:35 fetching corpus: 10750, signal 417604/621188 (executing program) 2023/01/27 20:34:35 fetching corpus: 10800, signal 418990/622770 (executing program) 2023/01/27 20:34:36 fetching corpus: 10850, signal 419763/624087 (executing program) 2023/01/27 20:34:36 fetching corpus: 10900, signal 420493/625344 (executing program) 2023/01/27 20:34:36 fetching corpus: 10950, signal 421039/626524 (executing program) 2023/01/27 20:34:36 fetching corpus: 11000, signal 421523/627696 (executing program) 2023/01/27 20:34:37 fetching corpus: 11050, signal 422207/628899 (executing program) 2023/01/27 20:34:37 fetching corpus: 11100, signal 422657/630026 (executing program) 2023/01/27 20:34:37 fetching corpus: 11150, signal 423092/631118 (executing program) 2023/01/27 20:34:37 fetching corpus: 11200, signal 423764/632340 (executing program) 2023/01/27 20:34:38 fetching corpus: 11250, signal 424353/633518 (executing program) 2023/01/27 20:34:38 fetching corpus: 11300, signal 425056/634786 (executing program) 2023/01/27 20:34:38 fetching corpus: 11350, signal 425562/635915 (executing program) 2023/01/27 20:34:38 fetching corpus: 11400, signal 426141/637094 (executing program) 2023/01/27 20:34:38 fetching corpus: 11450, signal 426626/638196 (executing program) 2023/01/27 20:34:39 fetching corpus: 11500, signal 427405/639447 (executing program) 2023/01/27 20:34:39 fetching corpus: 11550, signal 428392/640743 (executing program) 2023/01/27 20:34:39 fetching corpus: 11600, signal 428870/641839 (executing program) 2023/01/27 20:34:39 fetching corpus: 11650, signal 429153/642885 (executing program) 2023/01/27 20:34:39 fetching corpus: 11700, signal 429604/643970 (executing program) 2023/01/27 20:34:40 fetching corpus: 11750, signal 429987/644996 (executing program) 2023/01/27 20:34:40 fetching corpus: 11800, signal 430890/646267 (executing program) 2023/01/27 20:34:40 fetching corpus: 11850, signal 431472/647415 (executing program) 2023/01/27 20:34:40 fetching corpus: 11900, signal 431892/648525 (executing program) 2023/01/27 20:34:41 fetching corpus: 11950, signal 432277/649611 (executing program) 2023/01/27 20:34:41 fetching corpus: 12000, signal 432892/650737 (executing program) 2023/01/27 20:34:41 fetching corpus: 12050, signal 433346/651790 (executing program) 2023/01/27 20:34:41 fetching corpus: 12100, signal 434003/652936 (executing program) 2023/01/27 20:34:41 fetching corpus: 12150, signal 435201/654321 (executing program) 2023/01/27 20:34:42 fetching corpus: 12200, signal 435593/655390 (executing program) 2023/01/27 20:34:42 fetching corpus: 12250, signal 436224/656562 (executing program) 2023/01/27 20:34:42 fetching corpus: 12300, signal 436814/657691 (executing program) 2023/01/27 20:34:42 fetching corpus: 12350, signal 437260/658758 (executing program) 2023/01/27 20:34:42 fetching corpus: 12400, signal 437784/659881 (executing program) 2023/01/27 20:34:43 fetching corpus: 12450, signal 438168/660896 (executing program) 2023/01/27 20:34:43 fetching corpus: 12500, signal 438689/661959 (executing program) 2023/01/27 20:34:43 fetching corpus: 12550, signal 439175/663032 (executing program) 2023/01/27 20:34:43 fetching corpus: 12600, signal 439602/664074 (executing program) 2023/01/27 20:34:44 fetching corpus: 12650, signal 440165/665160 (executing program) 2023/01/27 20:34:44 fetching corpus: 12700, signal 440618/666207 (executing program) 2023/01/27 20:34:44 fetching corpus: 12750, signal 440998/667221 (executing program) 2023/01/27 20:34:45 fetching corpus: 12800, signal 441475/668254 (executing program) 2023/01/27 20:34:45 fetching corpus: 12850, signal 442115/669372 (executing program) 2023/01/27 20:34:45 fetching corpus: 12900, signal 442534/670382 (executing program) 2023/01/27 20:34:45 fetching corpus: 12950, signal 443083/671475 (executing program) 2023/01/27 20:34:46 fetching corpus: 13000, signal 443550/672517 (executing program) 2023/01/27 20:34:46 fetching corpus: 13050, signal 444459/673682 (executing program) 2023/01/27 20:34:46 fetching corpus: 13100, signal 444862/674700 (executing program) 2023/01/27 20:34:46 fetching corpus: 13150, signal 445146/675648 (executing program) 2023/01/27 20:34:46 fetching corpus: 13200, signal 445532/676648 (executing program) 2023/01/27 20:34:46 fetching corpus: 13250, signal 446086/677706 (executing program) 2023/01/27 20:34:47 fetching corpus: 13300, signal 446532/678715 (executing program) 2023/01/27 20:34:47 fetching corpus: 13350, signal 448012/680066 (executing program) 2023/01/27 20:34:47 fetching corpus: 13400, signal 448749/681247 (executing program) 2023/01/27 20:34:47 fetching corpus: 13450, signal 449199/682207 (executing program) 2023/01/27 20:34:48 fetching corpus: 13500, signal 450323/683380 (executing program) 2023/01/27 20:34:48 fetching corpus: 13550, signal 450735/684406 (executing program) 2023/01/27 20:34:48 fetching corpus: 13600, signal 451537/685466 (executing program) 2023/01/27 20:34:48 fetching corpus: 13650, signal 452075/686484 (executing program) 2023/01/27 20:34:49 fetching corpus: 13700, signal 452883/687597 (executing program) 2023/01/27 20:34:49 fetching corpus: 13750, signal 453459/688682 (executing program) 2023/01/27 20:34:49 fetching corpus: 13800, signal 453946/689704 (executing program) 2023/01/27 20:34:49 fetching corpus: 13850, signal 454300/690666 (executing program) 2023/01/27 20:34:49 fetching corpus: 13900, signal 454732/691639 (executing program) 2023/01/27 20:34:49 fetching corpus: 13950, signal 455139/692592 (executing program) 2023/01/27 20:34:50 fetching corpus: 14000, signal 455723/693601 (executing program) 2023/01/27 20:34:50 fetching corpus: 14050, signal 456180/694552 (executing program) 2023/01/27 20:34:50 fetching corpus: 14100, signal 456788/695580 (executing program) 2023/01/27 20:34:50 fetching corpus: 14150, signal 457198/696543 (executing program) 2023/01/27 20:34:50 fetching corpus: 14200, signal 457660/697531 (executing program) 2023/01/27 20:34:51 fetching corpus: 14250, signal 458116/698516 (executing program) 2023/01/27 20:34:51 fetching corpus: 14300, signal 458580/699471 (executing program) 2023/01/27 20:34:51 fetching corpus: 14350, signal 458950/700436 (executing program) 2023/01/27 20:34:51 fetching corpus: 14400, signal 459198/701337 (executing program) 2023/01/27 20:34:51 fetching corpus: 14450, signal 459744/702337 (executing program) 2023/01/27 20:34:51 fetching corpus: 14500, signal 460194/703295 (executing program) 2023/01/27 20:34:51 fetching corpus: 14550, signal 460635/704278 (executing program) 2023/01/27 20:34:52 fetching corpus: 14600, signal 461175/705258 (executing program) 2023/01/27 20:34:52 fetching corpus: 14650, signal 461780/706236 (executing program) 2023/01/27 20:34:52 fetching corpus: 14700, signal 462395/707249 (executing program) 2023/01/27 20:34:52 fetching corpus: 14750, signal 462905/708192 (executing program) 2023/01/27 20:34:52 fetching corpus: 14800, signal 463258/709077 (executing program) 2023/01/27 20:34:52 fetching corpus: 14850, signal 463858/710029 (executing program) 2023/01/27 20:34:53 fetching corpus: 14900, signal 464371/710962 (executing program) 2023/01/27 20:34:53 fetching corpus: 14950, signal 465021/711905 (executing program) 2023/01/27 20:34:53 fetching corpus: 15000, signal 465736/712905 (executing program) 2023/01/27 20:34:53 fetching corpus: 15050, signal 466179/713797 (executing program) 2023/01/27 20:34:53 fetching corpus: 15100, signal 466675/714748 (executing program) 2023/01/27 20:34:53 fetching corpus: 15150, signal 467088/715658 (executing program) 2023/01/27 20:34:54 fetching corpus: 15200, signal 467848/716647 (executing program) 2023/01/27 20:34:54 fetching corpus: 15250, signal 468357/717614 (executing program) 2023/01/27 20:34:54 fetching corpus: 15300, signal 468787/718496 (executing program) 2023/01/27 20:34:54 fetching corpus: 15350, signal 469591/719450 (executing program) 2023/01/27 20:34:55 fetching corpus: 15400, signal 470064/720345 (executing program) 2023/01/27 20:34:55 fetching corpus: 15450, signal 470394/721266 (executing program) 2023/01/27 20:34:55 fetching corpus: 15500, signal 470739/722136 (executing program) 2023/01/27 20:34:55 fetching corpus: 15550, signal 471311/723089 (executing program) 2023/01/27 20:34:56 fetching corpus: 15600, signal 471826/724031 (executing program) 2023/01/27 20:34:56 fetching corpus: 15650, signal 472470/724980 (executing program) 2023/01/27 20:34:56 fetching corpus: 15700, signal 473195/725902 (executing program) 2023/01/27 20:34:56 fetching corpus: 15750, signal 473825/726845 (executing program) 2023/01/27 20:34:56 fetching corpus: 15800, signal 474382/727759 (executing program) 2023/01/27 20:34:57 fetching corpus: 15850, signal 474738/728627 (executing program) 2023/01/27 20:34:57 fetching corpus: 15900, signal 475239/729491 (executing program) 2023/01/27 20:34:57 fetching corpus: 15950, signal 475683/730398 (executing program) 2023/01/27 20:34:57 fetching corpus: 16000, signal 476190/731324 (executing program) 2023/01/27 20:34:57 fetching corpus: 16050, signal 476910/732239 (executing program) 2023/01/27 20:34:58 fetching corpus: 16100, signal 477317/733133 (executing program) 2023/01/27 20:34:58 fetching corpus: 16150, signal 477754/734012 (executing program) 2023/01/27 20:34:58 fetching corpus: 16200, signal 478060/734882 (executing program) 2023/01/27 20:34:58 fetching corpus: 16250, signal 478357/735736 (executing program) 2023/01/27 20:34:58 fetching corpus: 16300, signal 478720/736644 (executing program) 2023/01/27 20:34:59 fetching corpus: 16350, signal 479106/737494 (executing program) 2023/01/27 20:34:59 fetching corpus: 16400, signal 479704/738374 (executing program) 2023/01/27 20:34:59 fetching corpus: 16450, signal 480147/739244 (executing program) 2023/01/27 20:35:00 fetching corpus: 16500, signal 480468/740080 (executing program) 2023/01/27 20:35:00 fetching corpus: 16550, signal 480888/740904 (executing program) 2023/01/27 20:35:00 fetching corpus: 16600, signal 481183/741743 (executing program) 2023/01/27 20:35:00 fetching corpus: 16650, signal 481808/742597 (executing program) 2023/01/27 20:35:00 fetching corpus: 16700, signal 482211/743421 (executing program) 2023/01/27 20:35:01 fetching corpus: 16750, signal 482568/744260 (executing program) 2023/01/27 20:35:01 fetching corpus: 16800, signal 482920/745061 (executing program) 2023/01/27 20:35:01 fetching corpus: 16850, signal 483247/745890 (executing program) 2023/01/27 20:35:01 fetching corpus: 16900, signal 483629/746733 (executing program) 2023/01/27 20:35:01 fetching corpus: 16950, signal 484111/747530 (executing program) 2023/01/27 20:35:02 fetching corpus: 17000, signal 484540/748355 (executing program) 2023/01/27 20:35:02 fetching corpus: 17050, signal 484832/749166 (executing program) 2023/01/27 20:35:02 fetching corpus: 17100, signal 485149/749985 (executing program) 2023/01/27 20:35:02 fetching corpus: 17150, signal 485589/750801 (executing program) 2023/01/27 20:35:03 fetching corpus: 17200, signal 485922/751594 (executing program) 2023/01/27 20:35:03 fetching corpus: 17250, signal 486416/752451 (executing program) 2023/01/27 20:35:03 fetching corpus: 17300, signal 486840/753241 (executing program) 2023/01/27 20:35:03 fetching corpus: 17350, signal 487258/754052 (executing program) 2023/01/27 20:35:04 fetching corpus: 17400, signal 487595/754909 (executing program) 2023/01/27 20:35:04 fetching corpus: 17450, signal 487911/755719 (executing program) 2023/01/27 20:35:04 fetching corpus: 17500, signal 488388/756558 (executing program) 2023/01/27 20:35:04 fetching corpus: 17550, signal 488963/757361 (executing program) 2023/01/27 20:35:04 fetching corpus: 17600, signal 489347/758188 (executing program) 2023/01/27 20:35:05 fetching corpus: 17650, signal 489779/758967 (executing program) 2023/01/27 20:35:05 fetching corpus: 17700, signal 490126/759782 (executing program) 2023/01/27 20:35:05 fetching corpus: 17750, signal 490705/760573 (executing program) 2023/01/27 20:35:05 fetching corpus: 17800, signal 490894/761430 (executing program) 2023/01/27 20:35:05 fetching corpus: 17850, signal 491320/762220 (executing program) 2023/01/27 20:35:06 fetching corpus: 17900, signal 491719/762975 (executing program) 2023/01/27 20:35:06 fetching corpus: 17950, signal 492055/763744 (executing program) 2023/01/27 20:35:06 fetching corpus: 18000, signal 492577/764585 (executing program) 2023/01/27 20:35:06 fetching corpus: 18050, signal 492935/765385 (executing program) 2023/01/27 20:35:06 fetching corpus: 18100, signal 493194/766146 (executing program) 2023/01/27 20:35:07 fetching corpus: 18150, signal 493444/766934 (executing program) 2023/01/27 20:35:07 fetching corpus: 18200, signal 493858/767704 (executing program) 2023/01/27 20:35:07 fetching corpus: 18250, signal 494283/768505 (executing program) 2023/01/27 20:35:07 fetching corpus: 18300, signal 494634/769303 (executing program) [ 138.495374][ T1321] ieee802154 phy0 wpan0: encryption failed: -22 [ 138.499569][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/27 20:35:07 fetching corpus: 18350, signal 495153/770140 (executing program) 2023/01/27 20:35:08 fetching corpus: 18400, signal 495486/770909 (executing program) 2023/01/27 20:35:08 fetching corpus: 18450, signal 495923/771694 (executing program) 2023/01/27 20:35:08 fetching corpus: 18500, signal 496481/772501 (executing program) 2023/01/27 20:35:08 fetching corpus: 18550, signal 496802/773283 (executing program) 2023/01/27 20:35:09 fetching corpus: 18600, signal 497298/774038 (executing program) 2023/01/27 20:35:09 fetching corpus: 18650, signal 497757/774782 (executing program) 2023/01/27 20:35:09 fetching corpus: 18700, signal 498273/775541 (executing program) 2023/01/27 20:35:09 fetching corpus: 18750, signal 498597/776297 (executing program) 2023/01/27 20:35:09 fetching corpus: 18800, signal 499079/777072 (executing program) 2023/01/27 20:35:10 fetching corpus: 18850, signal 499420/777798 (executing program) 2023/01/27 20:35:10 fetching corpus: 18900, signal 499812/778559 (executing program) 2023/01/27 20:35:10 fetching corpus: 18950, signal 500377/779326 (executing program) 2023/01/27 20:35:10 fetching corpus: 19000, signal 500674/780097 (executing program) 2023/01/27 20:35:10 fetching corpus: 19050, signal 501079/780821 (executing program) 2023/01/27 20:35:11 fetching corpus: 19100, signal 501313/781581 (executing program) 2023/01/27 20:35:11 fetching corpus: 19150, signal 501655/782355 (executing program) 2023/01/27 20:35:11 fetching corpus: 19200, signal 502114/783131 (executing program) 2023/01/27 20:35:11 fetching corpus: 19250, signal 502543/783900 (executing program) 2023/01/27 20:35:11 fetching corpus: 19300, signal 503156/784680 (executing program) 2023/01/27 20:35:12 fetching corpus: 19350, signal 503472/785457 (executing program) 2023/01/27 20:35:12 fetching corpus: 19400, signal 503754/786208 (executing program) 2023/01/27 20:35:12 fetching corpus: 19450, signal 504275/786930 (executing program) 2023/01/27 20:35:12 fetching corpus: 19500, signal 504779/787688 (executing program) 2023/01/27 20:35:12 fetching corpus: 19550, signal 505105/788401 (executing program) 2023/01/27 20:35:13 fetching corpus: 19600, signal 505436/789129 (executing program) 2023/01/27 20:35:13 fetching corpus: 19650, signal 505880/789901 (executing program) 2023/01/27 20:35:13 fetching corpus: 19700, signal 506260/790627 (executing program) 2023/01/27 20:35:13 fetching corpus: 19750, signal 507007/790961 (executing program) 2023/01/27 20:35:14 fetching corpus: 19800, signal 507662/790961 (executing program) 2023/01/27 20:35:14 fetching corpus: 19850, signal 508017/790961 (executing program) 2023/01/27 20:35:14 fetching corpus: 19900, signal 508363/790961 (executing program) 2023/01/27 20:35:14 fetching corpus: 19950, signal 508738/790961 (executing program) 2023/01/27 20:35:15 fetching corpus: 20000, signal 509226/790961 (executing program) 2023/01/27 20:35:15 fetching corpus: 20050, signal 509547/790961 (executing program) 2023/01/27 20:35:15 fetching corpus: 20100, signal 509825/790961 (executing program) 2023/01/27 20:35:15 fetching corpus: 20150, signal 510153/790961 (executing program) 2023/01/27 20:35:15 fetching corpus: 20200, signal 510458/790961 (executing program) 2023/01/27 20:35:16 fetching corpus: 20250, signal 510968/790961 (executing program) 2023/01/27 20:35:16 fetching corpus: 20300, signal 511625/790963 (executing program) 2023/01/27 20:35:16 fetching corpus: 20350, signal 511949/790963 (executing program) 2023/01/27 20:35:16 fetching corpus: 20400, signal 512339/790963 (executing program) 2023/01/27 20:35:17 fetching corpus: 20450, signal 512698/790963 (executing program) 2023/01/27 20:35:17 fetching corpus: 20500, signal 513081/790963 (executing program) 2023/01/27 20:35:17 fetching corpus: 20550, signal 513522/790963 (executing program) 2023/01/27 20:35:17 fetching corpus: 20600, signal 513797/790963 (executing program) 2023/01/27 20:35:18 fetching corpus: 20650, signal 514196/790963 (executing program) 2023/01/27 20:35:18 fetching corpus: 20700, signal 514685/790963 (executing program) 2023/01/27 20:35:18 fetching corpus: 20750, signal 515170/790963 (executing program) 2023/01/27 20:35:18 fetching corpus: 20800, signal 515483/790963 (executing program) 2023/01/27 20:35:19 fetching corpus: 20850, signal 515957/790963 (executing program) 2023/01/27 20:35:19 fetching corpus: 20900, signal 516290/790963 (executing program) 2023/01/27 20:35:19 fetching corpus: 20950, signal 516719/790963 (executing program) 2023/01/27 20:35:19 fetching corpus: 21000, signal 516917/790963 (executing program) 2023/01/27 20:35:19 fetching corpus: 21050, signal 517658/790963 (executing program) 2023/01/27 20:35:20 fetching corpus: 21100, signal 517928/790963 (executing program) 2023/01/27 20:35:20 fetching corpus: 21150, signal 518204/790963 (executing program) 2023/01/27 20:35:20 fetching corpus: 21200, signal 518676/790963 (executing program) 2023/01/27 20:35:20 fetching corpus: 21250, signal 519025/790963 (executing program) 2023/01/27 20:35:20 fetching corpus: 21300, signal 519364/790963 (executing program) 2023/01/27 20:35:21 fetching corpus: 21350, signal 519700/790963 (executing program) 2023/01/27 20:35:21 fetching corpus: 21400, signal 519956/790963 (executing program) 2023/01/27 20:35:21 fetching corpus: 21450, signal 520324/790963 (executing program) 2023/01/27 20:35:21 fetching corpus: 21500, signal 520607/790963 (executing program) 2023/01/27 20:35:21 fetching corpus: 21550, signal 520867/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21600, signal 521064/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21650, signal 521467/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21700, signal 521876/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21750, signal 522322/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21800, signal 522745/790963 (executing program) 2023/01/27 20:35:22 fetching corpus: 21850, signal 523076/790963 (executing program) 2023/01/27 20:35:23 fetching corpus: 21900, signal 523509/790963 (executing program) 2023/01/27 20:35:23 fetching corpus: 21950, signal 523767/790963 (executing program) 2023/01/27 20:35:23 fetching corpus: 22000, signal 524077/790963 (executing program) 2023/01/27 20:35:23 fetching corpus: 22050, signal 524414/790963 (executing program) 2023/01/27 20:35:24 fetching corpus: 22100, signal 524687/790968 (executing program) 2023/01/27 20:35:24 fetching corpus: 22150, signal 524902/790968 (executing program) 2023/01/27 20:35:24 fetching corpus: 22200, signal 525243/790968 (executing program) 2023/01/27 20:35:24 fetching corpus: 22250, signal 525596/790968 (executing program) 2023/01/27 20:35:24 fetching corpus: 22300, signal 525880/790968 (executing program) 2023/01/27 20:35:25 fetching corpus: 22350, signal 526255/790968 (executing program) 2023/01/27 20:35:25 fetching corpus: 22400, signal 526560/790968 (executing program) 2023/01/27 20:35:25 fetching corpus: 22450, signal 526923/790968 (executing program) 2023/01/27 20:35:25 fetching corpus: 22500, signal 527262/790968 (executing program) 2023/01/27 20:35:25 fetching corpus: 22550, signal 527540/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22600, signal 527888/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22650, signal 528246/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22700, signal 528530/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22750, signal 528968/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22800, signal 529273/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22850, signal 529621/790968 (executing program) 2023/01/27 20:35:26 fetching corpus: 22900, signal 529885/790968 (executing program) 2023/01/27 20:35:27 fetching corpus: 22950, signal 530146/790968 (executing program) 2023/01/27 20:35:27 fetching corpus: 23000, signal 530409/790968 (executing program) 2023/01/27 20:35:27 fetching corpus: 23050, signal 530721/790968 (executing program) 2023/01/27 20:35:27 fetching corpus: 23100, signal 531133/790968 (executing program) 2023/01/27 20:35:28 fetching corpus: 23150, signal 531436/790968 (executing program) 2023/01/27 20:35:28 fetching corpus: 23200, signal 531762/790968 (executing program) 2023/01/27 20:35:28 fetching corpus: 23250, signal 531975/790969 (executing program) 2023/01/27 20:35:28 fetching corpus: 23300, signal 532384/790969 (executing program) 2023/01/27 20:35:28 fetching corpus: 23350, signal 532651/790969 (executing program) 2023/01/27 20:35:28 fetching corpus: 23400, signal 532889/790969 (executing program) 2023/01/27 20:35:28 fetching corpus: 23450, signal 533329/790969 (executing program) 2023/01/27 20:35:29 fetching corpus: 23500, signal 533643/790969 (executing program) 2023/01/27 20:35:29 fetching corpus: 23550, signal 533991/790969 (executing program) 2023/01/27 20:35:29 fetching corpus: 23600, signal 534293/790969 (executing program) 2023/01/27 20:35:29 fetching corpus: 23650, signal 534660/790969 (executing program) 2023/01/27 20:35:29 fetching corpus: 23700, signal 534893/790969 (executing program) 2023/01/27 20:35:30 fetching corpus: 23750, signal 535327/790969 (executing program) 2023/01/27 20:35:30 fetching corpus: 23800, signal 535655/790970 (executing program) 2023/01/27 20:35:30 fetching corpus: 23850, signal 535971/790970 (executing program) 2023/01/27 20:35:30 fetching corpus: 23900, signal 536183/790970 (executing program) 2023/01/27 20:35:30 fetching corpus: 23950, signal 536434/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24000, signal 536698/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24050, signal 536993/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24100, signal 537387/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24150, signal 537748/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24200, signal 538030/790970 (executing program) 2023/01/27 20:35:31 fetching corpus: 24250, signal 538280/790970 (executing program) 2023/01/27 20:35:32 fetching corpus: 24300, signal 538605/790970 (executing program) 2023/01/27 20:35:32 fetching corpus: 24350, signal 538864/790970 (executing program) 2023/01/27 20:35:32 fetching corpus: 24400, signal 539093/790970 (executing program) 2023/01/27 20:35:32 fetching corpus: 24450, signal 539389/790970 (executing program) 2023/01/27 20:35:33 fetching corpus: 24500, signal 539870/790970 (executing program) 2023/01/27 20:35:33 fetching corpus: 24550, signal 540131/790970 (executing program) 2023/01/27 20:35:33 fetching corpus: 24600, signal 540526/790970 (executing program) 2023/01/27 20:35:33 fetching corpus: 24650, signal 540764/790970 (executing program) 2023/01/27 20:35:33 fetching corpus: 24700, signal 541167/790970 (executing program) 2023/01/27 20:35:34 fetching corpus: 24750, signal 541433/790970 (executing program) 2023/01/27 20:35:34 fetching corpus: 24800, signal 541627/790970 (executing program) 2023/01/27 20:35:34 fetching corpus: 24850, signal 541992/790970 (executing program) 2023/01/27 20:35:34 fetching corpus: 24900, signal 542310/790970 (executing program) 2023/01/27 20:35:35 fetching corpus: 24950, signal 542687/790970 (executing program) 2023/01/27 20:35:35 fetching corpus: 25000, signal 542982/790970 (executing program) 2023/01/27 20:35:35 fetching corpus: 25050, signal 543379/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25100, signal 543772/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25150, signal 544077/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25200, signal 544396/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25250, signal 544577/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25300, signal 544804/790970 (executing program) 2023/01/27 20:35:36 fetching corpus: 25350, signal 545070/790970 (executing program) 2023/01/27 20:35:37 fetching corpus: 25400, signal 545271/790970 (executing program) 2023/01/27 20:35:37 fetching corpus: 25450, signal 545603/790970 (executing program) 2023/01/27 20:35:37 fetching corpus: 25500, signal 545937/790970 (executing program) 2023/01/27 20:35:37 fetching corpus: 25550, signal 546316/790970 (executing program) 2023/01/27 20:35:38 fetching corpus: 25600, signal 546668/790970 (executing program) 2023/01/27 20:35:38 fetching corpus: 25650, signal 547054/790970 (executing program) 2023/01/27 20:35:38 fetching corpus: 25700, signal 547460/790970 (executing program) 2023/01/27 20:35:38 fetching corpus: 25750, signal 547671/790970 (executing program) 2023/01/27 20:35:38 fetching corpus: 25800, signal 547891/790970 (executing program) 2023/01/27 20:35:39 fetching corpus: 25850, signal 548207/790970 (executing program) 2023/01/27 20:35:39 fetching corpus: 25900, signal 548415/790970 (executing program) 2023/01/27 20:35:39 fetching corpus: 25950, signal 548833/790970 (executing program) 2023/01/27 20:35:39 fetching corpus: 26000, signal 549258/790970 (executing program) 2023/01/27 20:35:39 fetching corpus: 26050, signal 549724/790970 (executing program) 2023/01/27 20:35:40 fetching corpus: 26100, signal 549978/790970 (executing program) 2023/01/27 20:35:40 fetching corpus: 26150, signal 550170/790970 (executing program) 2023/01/27 20:35:40 fetching corpus: 26200, signal 550397/790970 (executing program) 2023/01/27 20:35:40 fetching corpus: 26250, signal 550634/790970 (executing program) 2023/01/27 20:35:40 fetching corpus: 26300, signal 550864/790970 (executing program) 2023/01/27 20:35:41 fetching corpus: 26350, signal 551318/790970 (executing program) 2023/01/27 20:35:41 fetching corpus: 26400, signal 551874/790970 (executing program) 2023/01/27 20:35:41 fetching corpus: 26450, signal 552146/790970 (executing program) 2023/01/27 20:35:41 fetching corpus: 26500, signal 552398/790970 (executing program) 2023/01/27 20:35:42 fetching corpus: 26550, signal 552666/790970 (executing program) 2023/01/27 20:35:42 fetching corpus: 26600, signal 553054/790970 (executing program) 2023/01/27 20:35:42 fetching corpus: 26650, signal 553326/790970 (executing program) 2023/01/27 20:35:42 fetching corpus: 26700, signal 553561/790970 (executing program) 2023/01/27 20:35:42 fetching corpus: 26750, signal 553798/790970 (executing program) 2023/01/27 20:35:43 fetching corpus: 26800, signal 554102/790970 (executing program) 2023/01/27 20:35:43 fetching corpus: 26850, signal 554344/790970 (executing program) 2023/01/27 20:35:43 fetching corpus: 26900, signal 554649/790970 (executing program) 2023/01/27 20:35:43 fetching corpus: 26950, signal 555004/790970 (executing program) 2023/01/27 20:35:43 fetching corpus: 27000, signal 555327/790970 (executing program) 2023/01/27 20:35:44 fetching corpus: 27050, signal 555577/790970 (executing program) 2023/01/27 20:35:44 fetching corpus: 27100, signal 555786/790971 (executing program) 2023/01/27 20:35:44 fetching corpus: 27150, signal 556141/790972 (executing program) 2023/01/27 20:35:44 fetching corpus: 27200, signal 556369/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27250, signal 556613/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27300, signal 556991/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27350, signal 557231/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27400, signal 557577/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27450, signal 557756/790972 (executing program) 2023/01/27 20:35:45 fetching corpus: 27500, signal 558076/790972 (executing program) 2023/01/27 20:35:46 fetching corpus: 27550, signal 558273/790973 (executing program) 2023/01/27 20:35:46 fetching corpus: 27600, signal 558489/790973 (executing program) 2023/01/27 20:35:46 fetching corpus: 27650, signal 558761/790973 (executing program) 2023/01/27 20:35:46 fetching corpus: 27700, signal 559010/790973 (executing program) 2023/01/27 20:35:46 fetching corpus: 27750, signal 559246/790973 (executing program) 2023/01/27 20:35:47 fetching corpus: 27800, signal 559577/790973 (executing program) 2023/01/27 20:35:47 fetching corpus: 27850, signal 560122/790973 (executing program) 2023/01/27 20:35:47 fetching corpus: 27900, signal 560479/790973 (executing program) 2023/01/27 20:35:47 fetching corpus: 27950, signal 560915/790973 (executing program) 2023/01/27 20:35:47 fetching corpus: 28000, signal 561426/790973 (executing program) 2023/01/27 20:35:48 fetching corpus: 28050, signal 561788/790973 (executing program) 2023/01/27 20:35:48 fetching corpus: 28100, signal 562111/790973 (executing program) 2023/01/27 20:35:48 fetching corpus: 28150, signal 562332/790973 (executing program) 2023/01/27 20:35:48 fetching corpus: 28200, signal 562567/790973 (executing program) 2023/01/27 20:35:48 fetching corpus: 28250, signal 562790/790973 (executing program) 2023/01/27 20:35:49 fetching corpus: 28300, signal 563009/790974 (executing program) 2023/01/27 20:35:49 fetching corpus: 28350, signal 563268/790974 (executing program) 2023/01/27 20:35:49 fetching corpus: 28400, signal 563482/790974 (executing program) 2023/01/27 20:35:49 fetching corpus: 28450, signal 563628/790974 (executing program) 2023/01/27 20:35:49 fetching corpus: 28500, signal 563933/790974 (executing program) 2023/01/27 20:35:50 fetching corpus: 28550, signal 564236/790974 (executing program) 2023/01/27 20:35:50 fetching corpus: 28600, signal 564525/790974 (executing program) 2023/01/27 20:35:50 fetching corpus: 28650, signal 564736/790974 (executing program) 2023/01/27 20:35:50 fetching corpus: 28700, signal 565126/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 28750, signal 565427/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 28800, signal 565661/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 28850, signal 565916/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 28900, signal 566173/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 28950, signal 566486/790974 (executing program) 2023/01/27 20:35:51 fetching corpus: 29000, signal 566722/790974 (executing program) 2023/01/27 20:35:52 fetching corpus: 29050, signal 566977/790974 (executing program) 2023/01/27 20:35:52 fetching corpus: 29100, signal 567283/790974 (executing program) 2023/01/27 20:35:52 fetching corpus: 29150, signal 567523/790974 (executing program) 2023/01/27 20:35:52 fetching corpus: 29200, signal 567790/790974 (executing program) 2023/01/27 20:35:52 fetching corpus: 29250, signal 568057/790974 (executing program) 2023/01/27 20:35:53 fetching corpus: 29300, signal 568248/790974 (executing program) 2023/01/27 20:35:53 fetching corpus: 29350, signal 568527/790974 (executing program) 2023/01/27 20:35:53 fetching corpus: 29400, signal 568836/790974 (executing program) 2023/01/27 20:35:53 fetching corpus: 29450, signal 569103/790974 (executing program) 2023/01/27 20:35:53 fetching corpus: 29500, signal 569340/790974 (executing program) 2023/01/27 20:35:54 fetching corpus: 29550, signal 569546/790974 (executing program) 2023/01/27 20:35:54 fetching corpus: 29600, signal 569739/790974 (executing program) 2023/01/27 20:35:54 fetching corpus: 29650, signal 569960/790974 (executing program) 2023/01/27 20:35:54 fetching corpus: 29700, signal 570159/790974 (executing program) 2023/01/27 20:35:54 fetching corpus: 29750, signal 570499/790974 (executing program) 2023/01/27 20:35:55 fetching corpus: 29800, signal 570852/790974 (executing program) 2023/01/27 20:35:55 fetching corpus: 29850, signal 571178/790974 (executing program) 2023/01/27 20:35:55 fetching corpus: 29900, signal 571641/790974 (executing program) 2023/01/27 20:35:55 fetching corpus: 29950, signal 571845/790974 (executing program) 2023/01/27 20:35:55 fetching corpus: 30000, signal 572131/790974 (executing program) 2023/01/27 20:35:56 fetching corpus: 30050, signal 572387/790974 (executing program) 2023/01/27 20:35:56 fetching corpus: 30100, signal 572537/790974 (executing program) 2023/01/27 20:35:56 fetching corpus: 30150, signal 572893/790974 (executing program) 2023/01/27 20:35:56 fetching corpus: 30200, signal 573225/790974 (executing program) 2023/01/27 20:35:56 fetching corpus: 30250, signal 573465/790974 (executing program) 2023/01/27 20:35:57 fetching corpus: 30300, signal 573894/790974 (executing program) 2023/01/27 20:35:57 fetching corpus: 30350, signal 574223/790974 (executing program) 2023/01/27 20:35:57 fetching corpus: 30400, signal 574485/790974 (executing program) 2023/01/27 20:35:57 fetching corpus: 30450, signal 574749/790974 (executing program) 2023/01/27 20:35:57 fetching corpus: 30500, signal 574984/790974 (executing program) 2023/01/27 20:35:58 fetching corpus: 30550, signal 575269/790974 (executing program) 2023/01/27 20:35:58 fetching corpus: 30600, signal 575491/790974 (executing program) 2023/01/27 20:35:58 fetching corpus: 30650, signal 575717/790974 (executing program) 2023/01/27 20:35:58 fetching corpus: 30700, signal 575994/790974 (executing program) 2023/01/27 20:35:59 fetching corpus: 30750, signal 576318/790974 (executing program) 2023/01/27 20:35:59 fetching corpus: 30800, signal 577355/790974 (executing program) 2023/01/27 20:35:59 fetching corpus: 30850, signal 577655/790974 (executing program) 2023/01/27 20:35:59 fetching corpus: 30900, signal 577821/790974 (executing program) 2023/01/27 20:35:59 fetching corpus: 30950, signal 578086/790974 (executing program) 2023/01/27 20:36:00 fetching corpus: 31000, signal 578339/790974 (executing program) 2023/01/27 20:36:00 fetching corpus: 31050, signal 578540/790974 (executing program) 2023/01/27 20:36:00 fetching corpus: 31100, signal 578908/790974 (executing program) 2023/01/27 20:36:00 fetching corpus: 31150, signal 579165/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31200, signal 579404/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31250, signal 579808/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31300, signal 580049/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31350, signal 580379/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31400, signal 580728/790974 (executing program) 2023/01/27 20:36:01 fetching corpus: 31450, signal 580986/790974 (executing program) 2023/01/27 20:36:02 fetching corpus: 31500, signal 581230/790974 (executing program) 2023/01/27 20:36:02 fetching corpus: 31550, signal 581533/790974 (executing program) 2023/01/27 20:36:02 fetching corpus: 31600, signal 581750/790974 (executing program) 2023/01/27 20:36:03 fetching corpus: 31650, signal 582039/790974 (executing program) 2023/01/27 20:36:03 fetching corpus: 31700, signal 582376/790974 (executing program) 2023/01/27 20:36:03 fetching corpus: 31750, signal 582661/790974 (executing program) 2023/01/27 20:36:03 fetching corpus: 31800, signal 582850/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 31850, signal 583128/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 31900, signal 583393/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 31950, signal 583791/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 32000, signal 584065/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 32050, signal 584331/790974 (executing program) 2023/01/27 20:36:04 fetching corpus: 32100, signal 584529/790974 (executing program) 2023/01/27 20:36:05 fetching corpus: 32150, signal 584872/790974 (executing program) 2023/01/27 20:36:05 fetching corpus: 32200, signal 585182/790974 (executing program) 2023/01/27 20:36:05 fetching corpus: 32250, signal 585448/790974 (executing program) 2023/01/27 20:36:05 fetching corpus: 32300, signal 585715/790974 (executing program) 2023/01/27 20:36:05 fetching corpus: 32350, signal 585996/790974 (executing program) 2023/01/27 20:36:06 fetching corpus: 32400, signal 586425/790974 (executing program) 2023/01/27 20:36:06 fetching corpus: 32450, signal 586648/790974 (executing program) 2023/01/27 20:36:06 fetching corpus: 32500, signal 586912/790974 (executing program) 2023/01/27 20:36:06 fetching corpus: 32550, signal 587175/790981 (executing program) 2023/01/27 20:36:06 fetching corpus: 32600, signal 587434/790981 (executing program) 2023/01/27 20:36:07 fetching corpus: 32650, signal 587668/790981 (executing program) 2023/01/27 20:36:07 fetching corpus: 32700, signal 587988/790981 (executing program) 2023/01/27 20:36:07 fetching corpus: 32750, signal 588158/790981 (executing program) 2023/01/27 20:36:07 fetching corpus: 32800, signal 588364/790981 (executing program) 2023/01/27 20:36:08 fetching corpus: 32850, signal 588585/790981 (executing program) 2023/01/27 20:36:08 fetching corpus: 32900, signal 588859/790981 (executing program) 2023/01/27 20:36:08 fetching corpus: 32950, signal 589105/790981 (executing program) 2023/01/27 20:36:08 fetching corpus: 33000, signal 589412/790981 (executing program) 2023/01/27 20:36:08 fetching corpus: 33050, signal 589654/790981 (executing program) [ 199.947503][ T1321] ieee802154 phy0 wpan0: encryption failed: -22 [ 199.952494][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/27 20:36:09 fetching corpus: 33100, signal 590023/790981 (executing program) 2023/01/27 20:36:09 fetching corpus: 33150, signal 590348/790981 (executing program) 2023/01/27 20:36:09 fetching corpus: 33200, signal 590542/790981 (executing program) 2023/01/27 20:36:09 fetching corpus: 33250, signal 590786/790981 (executing program) 2023/01/27 20:36:10 fetching corpus: 33300, signal 591056/790981 (executing program) 2023/01/27 20:36:10 fetching corpus: 33350, signal 591222/790981 (executing program) 2023/01/27 20:36:10 fetching corpus: 33400, signal 591471/790991 (executing program) 2023/01/27 20:36:10 fetching corpus: 33450, signal 591959/790991 (executing program) 2023/01/27 20:36:11 fetching corpus: 33500, signal 592195/790991 (executing program) 2023/01/27 20:36:11 fetching corpus: 33550, signal 592410/790991 (executing program) 2023/01/27 20:36:11 fetching corpus: 33600, signal 592588/790991 (executing program) 2023/01/27 20:36:11 fetching corpus: 33650, signal 592858/790991 (executing program) 2023/01/27 20:36:11 fetching corpus: 33700, signal 593038/790991 (executing program) 2023/01/27 20:36:12 fetching corpus: 33750, signal 593255/790991 (executing program) 2023/01/27 20:36:12 fetching corpus: 33800, signal 593537/790991 (executing program) 2023/01/27 20:36:12 fetching corpus: 33850, signal 593804/790991 (executing program) 2023/01/27 20:36:12 fetching corpus: 33900, signal 594046/790991 (executing program) 2023/01/27 20:36:12 fetching corpus: 33950, signal 594242/790991 (executing program) 2023/01/27 20:36:13 fetching corpus: 34000, signal 594564/790991 (executing program) 2023/01/27 20:36:13 fetching corpus: 34050, signal 594786/790991 (executing program) 2023/01/27 20:36:13 fetching corpus: 34100, signal 594994/790991 (executing program) 2023/01/27 20:36:13 fetching corpus: 34150, signal 595220/790991 (executing program) 2023/01/27 20:36:14 fetching corpus: 34200, signal 595499/790991 (executing program) 2023/01/27 20:36:14 fetching corpus: 34250, signal 595739/790991 (executing program) 2023/01/27 20:36:14 fetching corpus: 34300, signal 595948/790991 (executing program) 2023/01/27 20:36:14 fetching corpus: 34350, signal 596283/790991 (executing program) 2023/01/27 20:36:15 fetching corpus: 34400, signal 596487/790991 (executing program) 2023/01/27 20:36:15 fetching corpus: 34450, signal 596992/790991 (executing program) 2023/01/27 20:36:15 fetching corpus: 34500, signal 597210/790991 (executing program) 2023/01/27 20:36:15 fetching corpus: 34550, signal 597400/790991 (executing program) 2023/01/27 20:36:15 fetching corpus: 34600, signal 597634/790997 (executing program) 2023/01/27 20:36:15 fetching corpus: 34650, signal 597886/790997 (executing program) 2023/01/27 20:36:16 fetching corpus: 34700, signal 598173/790997 (executing program) 2023/01/27 20:36:16 fetching corpus: 34750, signal 598467/790997 (executing program) 2023/01/27 20:36:16 fetching corpus: 34800, signal 598675/790997 (executing program) 2023/01/27 20:36:16 fetching corpus: 34850, signal 599011/790997 (executing program) 2023/01/27 20:36:16 fetching corpus: 34900, signal 599410/790997 (executing program) 2023/01/27 20:36:17 fetching corpus: 34950, signal 599722/790997 (executing program) 2023/01/27 20:36:17 fetching corpus: 35000, signal 600105/790997 (executing program) 2023/01/27 20:36:17 fetching corpus: 35050, signal 600279/790997 (executing program) 2023/01/27 20:36:17 fetching corpus: 35100, signal 600563/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35150, signal 601222/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35200, signal 601431/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35250, signal 601639/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35300, signal 601854/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35350, signal 602035/790997 (executing program) 2023/01/27 20:36:18 fetching corpus: 35400, signal 602217/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35450, signal 602488/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35500, signal 602792/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35550, signal 602972/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35600, signal 603189/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35650, signal 603395/790997 (executing program) 2023/01/27 20:36:19 fetching corpus: 35700, signal 603651/790997 (executing program) 2023/01/27 20:36:20 fetching corpus: 35750, signal 603943/790997 (executing program) 2023/01/27 20:36:20 fetching corpus: 35800, signal 604241/790997 (executing program) 2023/01/27 20:36:20 fetching corpus: 35850, signal 604371/790997 (executing program) 2023/01/27 20:36:20 fetching corpus: 35900, signal 604698/790997 (executing program) 2023/01/27 20:36:21 fetching corpus: 35950, signal 604969/790997 (executing program) 2023/01/27 20:36:21 fetching corpus: 36000, signal 605245/790997 (executing program) 2023/01/27 20:36:21 fetching corpus: 36050, signal 605428/790997 (executing program) 2023/01/27 20:36:21 fetching corpus: 36100, signal 605629/790997 (executing program) 2023/01/27 20:36:22 fetching corpus: 36150, signal 605979/790997 (executing program) 2023/01/27 20:36:22 fetching corpus: 36200, signal 606190/790997 (executing program) 2023/01/27 20:36:22 fetching corpus: 36250, signal 606456/790997 (executing program) 2023/01/27 20:36:22 fetching corpus: 36300, signal 606747/790997 (executing program) 2023/01/27 20:36:22 fetching corpus: 36350, signal 606986/790997 (executing program) 2023/01/27 20:36:23 fetching corpus: 36400, signal 607272/790997 (executing program) 2023/01/27 20:36:23 fetching corpus: 36450, signal 607497/790997 (executing program) 2023/01/27 20:36:23 fetching corpus: 36500, signal 607793/790997 (executing program) 2023/01/27 20:36:23 fetching corpus: 36550, signal 608217/790997 (executing program) 2023/01/27 20:36:23 fetching corpus: 36600, signal 608406/790997 (executing program) 2023/01/27 20:36:24 fetching corpus: 36650, signal 608534/790997 (executing program) 2023/01/27 20:36:24 fetching corpus: 36700, signal 608747/790997 (executing program) 2023/01/27 20:36:24 fetching corpus: 36750, signal 608952/790997 (executing program) 2023/01/27 20:36:24 fetching corpus: 36800, signal 609180/790997 (executing program) 2023/01/27 20:36:24 fetching corpus: 36850, signal 609478/790997 (executing program) 2023/01/27 20:36:25 fetching corpus: 36900, signal 609720/790997 (executing program) 2023/01/27 20:36:25 fetching corpus: 36950, signal 609903/790997 (executing program) 2023/01/27 20:36:25 fetching corpus: 37000, signal 610143/790997 (executing program) 2023/01/27 20:36:25 fetching corpus: 37050, signal 610342/790997 (executing program) 2023/01/27 20:36:25 fetching corpus: 37100, signal 610562/790997 (executing program) 2023/01/27 20:36:26 fetching corpus: 37150, signal 610838/790997 (executing program) 2023/01/27 20:36:26 fetching corpus: 37200, signal 611081/790997 (executing program) 2023/01/27 20:36:26 fetching corpus: 37250, signal 611291/790997 (executing program) 2023/01/27 20:36:26 fetching corpus: 37300, signal 611718/790997 (executing program) 2023/01/27 20:36:27 fetching corpus: 37350, signal 611933/790997 (executing program) 2023/01/27 20:36:27 fetching corpus: 37400, signal 612114/790997 (executing program) 2023/01/27 20:36:27 fetching corpus: 37450, signal 612293/790997 (executing program) 2023/01/27 20:36:27 fetching corpus: 37500, signal 612506/790997 (executing program) 2023/01/27 20:36:27 fetching corpus: 37550, signal 612824/790997 (executing program) 2023/01/27 20:36:28 fetching corpus: 37600, signal 613083/790997 (executing program) 2023/01/27 20:36:28 fetching corpus: 37650, signal 613263/790997 (executing program) 2023/01/27 20:36:28 fetching corpus: 37700, signal 613494/790997 (executing program) 2023/01/27 20:36:28 fetching corpus: 37750, signal 613740/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 37800, signal 613962/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 37850, signal 614205/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 37900, signal 614562/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 37950, signal 614722/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 38000, signal 614909/790997 (executing program) 2023/01/27 20:36:29 fetching corpus: 38050, signal 615170/790997 (executing program) 2023/01/27 20:36:30 fetching corpus: 38100, signal 615397/790997 (executing program) 2023/01/27 20:36:30 fetching corpus: 38150, signal 615533/790997 (executing program) 2023/01/27 20:36:30 fetching corpus: 38200, signal 615745/790997 (executing program) 2023/01/27 20:36:30 fetching corpus: 38250, signal 615930/790997 (executing program) 2023/01/27 20:36:31 fetching corpus: 38300, signal 616158/790997 (executing program) 2023/01/27 20:36:31 fetching corpus: 38350, signal 616356/790997 (executing program) 2023/01/27 20:36:31 fetching corpus: 38400, signal 616768/790997 (executing program) 2023/01/27 20:36:31 fetching corpus: 38450, signal 616951/790997 (executing program) 2023/01/27 20:36:32 fetching corpus: 38500, signal 617123/790997 (executing program) 2023/01/27 20:36:32 fetching corpus: 38550, signal 617306/790997 (executing program) 2023/01/27 20:36:32 fetching corpus: 38600, signal 617554/790997 (executing program) 2023/01/27 20:36:32 fetching corpus: 38650, signal 617750/790997 (executing program) 2023/01/27 20:36:32 fetching corpus: 38700, signal 617934/790997 (executing program) 2023/01/27 20:36:33 fetching corpus: 38750, signal 618120/790997 (executing program) 2023/01/27 20:36:33 fetching corpus: 38800, signal 618395/790997 (executing program) 2023/01/27 20:36:33 fetching corpus: 38850, signal 618596/790997 (executing program) 2023/01/27 20:36:33 fetching corpus: 38900, signal 618839/790997 (executing program) 2023/01/27 20:36:34 fetching corpus: 38950, signal 619088/790997 (executing program) 2023/01/27 20:36:34 fetching corpus: 39000, signal 619288/790997 (executing program) 2023/01/27 20:36:34 fetching corpus: 39050, signal 619513/790998 (executing program) 2023/01/27 20:36:34 fetching corpus: 39100, signal 619717/790998 (executing program) 2023/01/27 20:36:35 fetching corpus: 39150, signal 619871/790998 (executing program) 2023/01/27 20:36:35 fetching corpus: 39200, signal 620131/790998 (executing program) 2023/01/27 20:36:35 fetching corpus: 39250, signal 620265/790999 (executing program) 2023/01/27 20:36:35 fetching corpus: 39300, signal 620416/790999 (executing program) 2023/01/27 20:36:35 fetching corpus: 39350, signal 620580/790999 (executing program) 2023/01/27 20:36:35 fetching corpus: 39400, signal 620812/790999 (executing program) 2023/01/27 20:36:36 fetching corpus: 39450, signal 621082/790999 (executing program) 2023/01/27 20:36:36 fetching corpus: 39500, signal 621304/790999 (executing program) 2023/01/27 20:36:36 fetching corpus: 39550, signal 621408/790999 (executing program) 2023/01/27 20:36:36 fetching corpus: 39600, signal 621641/790999 (executing program) 2023/01/27 20:36:37 fetching corpus: 39650, signal 621824/790999 (executing program) 2023/01/27 20:36:37 fetching corpus: 39700, signal 621996/790999 (executing program) 2023/01/27 20:36:37 fetching corpus: 39750, signal 622348/790999 (executing program) 2023/01/27 20:36:37 fetching corpus: 39800, signal 622529/790999 (executing program) 2023/01/27 20:36:37 fetching corpus: 39850, signal 622854/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 39900, signal 623020/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 39950, signal 623190/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 40000, signal 623383/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 40050, signal 623587/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 40100, signal 623839/790999 (executing program) 2023/01/27 20:36:38 fetching corpus: 40150, signal 624022/790999 (executing program) 2023/01/27 20:36:39 fetching corpus: 40200, signal 624268/790999 (executing program) 2023/01/27 20:36:39 fetching corpus: 40250, signal 624432/790999 (executing program) 2023/01/27 20:36:39 fetching corpus: 40300, signal 624615/790999 (executing program) 2023/01/27 20:36:39 fetching corpus: 40350, signal 624803/790999 (executing program) 2023/01/27 20:36:40 fetching corpus: 40400, signal 625107/790999 (executing program) 2023/01/27 20:36:40 fetching corpus: 40450, signal 625302/791000 (executing program) 2023/01/27 20:36:40 fetching corpus: 40500, signal 625495/791000 (executing program) 2023/01/27 20:36:40 fetching corpus: 40550, signal 625666/791000 (executing program) 2023/01/27 20:36:40 fetching corpus: 40600, signal 626001/791000 (executing program) 2023/01/27 20:36:40 fetching corpus: 40650, signal 626246/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40700, signal 626483/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40750, signal 626704/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40800, signal 626881/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40850, signal 627062/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40900, signal 627247/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 40950, signal 627351/791000 (executing program) 2023/01/27 20:36:41 fetching corpus: 41000, signal 627511/791000 (executing program) 2023/01/27 20:36:42 fetching corpus: 41050, signal 627694/791000 (executing program) 2023/01/27 20:36:42 fetching corpus: 41100, signal 627910/791000 (executing program) 2023/01/27 20:36:42 fetching corpus: 41150, signal 628105/791000 (executing program) 2023/01/27 20:36:42 fetching corpus: 41200, signal 628282/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41250, signal 628418/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41300, signal 628585/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41350, signal 628907/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41400, signal 629224/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41450, signal 629378/791000 (executing program) 2023/01/27 20:36:43 fetching corpus: 41500, signal 629531/791000 (executing program) 2023/01/27 20:36:44 fetching corpus: 41550, signal 629752/791000 (executing program) 2023/01/27 20:36:44 fetching corpus: 41600, signal 629993/791000 (executing program) 2023/01/27 20:36:44 fetching corpus: 41650, signal 630157/791000 (executing program) 2023/01/27 20:36:44 fetching corpus: 41700, signal 630379/791000 (executing program) 2023/01/27 20:36:45 fetching corpus: 41750, signal 630688/791000 (executing program) 2023/01/27 20:36:45 fetching corpus: 41800, signal 630922/791000 (executing program) 2023/01/27 20:36:45 fetching corpus: 41850, signal 631095/791000 (executing program) 2023/01/27 20:36:45 fetching corpus: 41900, signal 631276/791000 (executing program) 2023/01/27 20:36:45 fetching corpus: 41950, signal 631492/791000 (executing program) 2023/01/27 20:36:46 fetching corpus: 42000, signal 631672/791000 (executing program) 2023/01/27 20:36:46 fetching corpus: 42050, signal 631865/791000 (executing program) 2023/01/27 20:36:46 fetching corpus: 42100, signal 632041/791000 (executing program) 2023/01/27 20:36:46 fetching corpus: 42150, signal 632244/791000 (executing program) 2023/01/27 20:36:46 fetching corpus: 42200, signal 632401/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42250, signal 632700/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42300, signal 632863/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42350, signal 633030/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42400, signal 633277/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42450, signal 633416/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42500, signal 633590/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42504, signal 633607/791000 (executing program) 2023/01/27 20:36:47 fetching corpus: 42504, signal 633607/791000 (executing program) 2023/01/27 20:36:51 starting 4 fuzzer processes 20:36:51 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x18, 0x140a, 0x421, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 20:36:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1d}, 0x48) 20:36:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x31, 0x0, &(0x7f0000000380)) 20:36:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x38, 0x0, &(0x7f0000000380)) [ 242.145237][ T5182] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 242.153159][ T5186] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 242.153194][ T5184] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 242.158421][ T5186] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 242.164312][ T5184] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 242.167382][ T5190] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 242.174202][ T5184] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 242.175729][ T5192] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 242.176326][ T5192] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 242.178305][ T5186] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 242.178823][ T5190] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 242.179363][ T5186] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 242.179564][ T5190] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 242.179871][ T5190] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 242.179937][ T5186] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 242.180099][ T5186] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 242.180251][ T5186] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 242.186263][ T5191] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 242.203839][ T5184] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 242.214946][ T5190] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 242.218330][ T5184] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 242.222908][ T5190] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 242.227097][ T5184] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 242.256594][ T5184] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 242.499071][ T5177] chnl_net:caif_netlink_parms(): no params data found [ 242.602304][ T5175] chnl_net:caif_netlink_parms(): no params data found [ 242.758548][ T5177] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.764593][ T5177] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.771476][ T5177] device bridge_slave_0 entered promiscuous mode [ 242.801005][ T5188] chnl_net:caif_netlink_parms(): no params data found [ 242.809727][ T5177] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.816921][ T5177] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.823384][ T5177] device bridge_slave_1 entered promiscuous mode [ 242.873533][ T5177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 242.912282][ T5177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.967866][ T5176] chnl_net:caif_netlink_parms(): no params data found [ 243.001375][ T5177] team0: Port device team_slave_0 added [ 243.027977][ T5175] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.034314][ T5175] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.040448][ T5175] device bridge_slave_0 entered promiscuous mode [ 243.050345][ T5175] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.056342][ T5175] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.063048][ T5175] device bridge_slave_1 entered promiscuous mode [ 243.071277][ T5177] team0: Port device team_slave_1 added [ 243.188163][ T5177] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 243.192887][ T5177] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.208159][ T5177] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 243.265218][ T5175] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.272157][ T5177] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 243.277218][ T5177] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.294394][ T5177] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 243.307581][ T5188] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.312435][ T5188] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.318148][ T5188] device bridge_slave_0 entered promiscuous mode [ 243.330423][ T5188] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.335939][ T5188] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.342744][ T5188] device bridge_slave_1 entered promiscuous mode [ 243.351516][ T5175] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.480467][ T5175] team0: Port device team_slave_0 added [ 243.485082][ T5176] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.490681][ T5176] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.497775][ T5176] device bridge_slave_0 entered promiscuous mode [ 243.510720][ T5188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.531901][ T5175] team0: Port device team_slave_1 added [ 243.551597][ T5176] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.557063][ T5176] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.562491][ T5176] device bridge_slave_1 entered promiscuous mode [ 243.590188][ T5188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.600341][ T5177] device hsr_slave_0 entered promiscuous mode [ 243.606435][ T5177] device hsr_slave_1 entered promiscuous mode [ 243.676157][ T5175] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 243.681378][ T5175] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.701474][ T5175] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 243.711803][ T5176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.738462][ T5175] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 243.746104][ T5175] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.763960][ T5175] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 243.773450][ T5176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.802791][ T5188] team0: Port device team_slave_0 added [ 243.875899][ T5188] team0: Port device team_slave_1 added [ 243.885531][ T5176] team0: Port device team_slave_0 added [ 243.892885][ T5176] team0: Port device team_slave_1 added [ 244.002187][ T5176] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.007914][ T5176] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.025419][ T5176] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.037781][ T5176] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.043117][ T5176] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.060244][ T5176] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 244.069645][ T5188] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.074740][ T5188] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.096135][ T5188] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.135058][ T5175] device hsr_slave_0 entered promiscuous mode [ 244.140087][ T5175] device hsr_slave_1 entered promiscuous mode [ 244.145075][ T5175] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 244.150307][ T5175] Cannot create hsr debugfs directory [ 244.174497][ T5188] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.179887][ T5188] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.197639][ T5188] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 244.265028][ T5184] Bluetooth: hci1: command 0x0409 tx timeout [ 244.270694][ T5182] Bluetooth: hci0: command 0x0409 tx timeout [ 244.271552][ T5190] Bluetooth: hci2: command 0x0409 tx timeout [ 244.284367][ T5176] device hsr_slave_0 entered promiscuous mode [ 244.289693][ T5176] device hsr_slave_1 entered promiscuous mode [ 244.296725][ T5176] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 244.301406][ T5176] Cannot create hsr debugfs directory [ 244.334160][ T5190] Bluetooth: hci3: command 0x0409 tx timeout [ 244.369556][ T5188] device hsr_slave_0 entered promiscuous mode [ 244.375756][ T5188] device hsr_slave_1 entered promiscuous mode [ 244.382171][ T5188] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 244.387936][ T5188] Cannot create hsr debugfs directory [ 244.644204][ T5177] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 244.655329][ T5177] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 244.662639][ T5177] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 244.673805][ T5177] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 244.745604][ T5175] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 244.756982][ T5175] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 244.775582][ T5175] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 244.791839][ T5175] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 244.836385][ T5176] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 244.857182][ T5176] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 244.868196][ T5176] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 244.898487][ T5176] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 244.949427][ T5188] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 244.959713][ T5188] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 244.976817][ T5188] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 244.984709][ T5188] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 245.031228][ T5177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.065454][ T5177] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.085808][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.093034][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.108906][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.115603][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.122073][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.128293][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.135467][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.141654][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.149078][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.154004][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.172250][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.200531][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.208724][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.215759][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.224006][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.230454][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.243703][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.250446][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.261101][ T5175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.282340][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.287823][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.294699][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.300807][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.316959][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.322821][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.332524][ T5177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.342733][ T5176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.354401][ T5175] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.368815][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.376222][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.382928][ T1231] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.388665][ T1231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.421222][ T5188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.430409][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.441016][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.448512][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.455630][ T1352] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.461176][ T1352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.470402][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.477810][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.484844][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.496772][ T5176] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.508176][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.514514][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.520619][ T5221] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.525444][ T5221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.531823][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.553990][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.565703][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.576933][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.583584][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.590071][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.596484][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.602341][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.609811][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.616521][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.636123][ T5175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.642942][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.649496][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.655626][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.661621][ T5220] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.666726][ T5220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.671810][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.688078][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.694477][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.700056][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.719989][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.731789][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.741049][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.750410][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.758605][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.774497][ T5177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.782287][ T5188] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.791940][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 245.797831][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 245.826077][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.832974][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.841570][ T1352] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.848060][ T1352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.854130][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.859442][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.865179][ T1352] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.869647][ T1352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.875943][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 245.882226][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 245.889528][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.895737][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.902029][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.921982][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 245.928091][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.934525][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 245.940826][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.951853][ T5176] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.959879][ T5176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.972349][ T5188] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 245.980931][ T5188] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.989723][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.998006][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.006124][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.014638][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.022541][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.030474][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.037798][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.045537][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.080215][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.087588][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.096790][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.102775][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.122925][ T5175] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.131952][ T5177] device veth0_vlan entered promiscuous mode [ 246.140024][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.146282][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.153066][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.159264][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.171665][ T5177] device veth1_vlan entered promiscuous mode [ 246.189648][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.195170][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.200588][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.207119][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.230664][ T5177] device veth0_macvtap entered promiscuous mode [ 246.238483][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.245945][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.252361][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.261170][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.268644][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 246.275654][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.280934][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.287998][ T5175] device veth0_vlan entered promiscuous mode [ 246.300555][ T5177] device veth1_macvtap entered promiscuous mode [ 246.309864][ T5175] device veth1_vlan entered promiscuous mode [ 246.328251][ T5176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.333675][ T5190] Bluetooth: hci1: command 0x041b tx timeout [ 246.333775][ T4548] Bluetooth: hci2: command 0x041b tx timeout [ 246.335980][ T5184] Bluetooth: hci0: command 0x041b tx timeout [ 246.348947][ T5188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.354670][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.361623][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.370190][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.378011][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.386784][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.395990][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.413537][ T5190] Bluetooth: hci3: command 0x041b tx timeout [ 246.421898][ T5177] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 246.438166][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.444815][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.451210][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.458700][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.465933][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.488754][ T5176] device veth0_vlan entered promiscuous mode [ 246.496068][ T5177] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 246.505892][ T5177] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.516084][ T5177] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.525443][ T5177] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.535224][ T5177] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.549316][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.557604][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.565383][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.573003][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.581282][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.586917][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.599679][ T5176] device veth1_vlan entered promiscuous mode [ 246.632996][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.641342][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.648090][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.668525][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.682959][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.688926][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.702256][ T5175] device veth0_macvtap entered promiscuous mode [ 246.729982][ T5175] device veth1_macvtap entered promiscuous mode [ 246.752405][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 246.760826][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.766997][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.773048][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.792756][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.799530][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.804641][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.810581][ T5222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.817609][ T5188] device veth0_vlan entered promiscuous mode [ 246.850478][ T5176] device veth0_macvtap entered promiscuous mode [ 246.863187][ T5201] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 246.866491][ T5175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 246.871316][ T5201] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 246.879962][ T5175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.893773][ T5175] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 246.901267][ T5188] device veth1_vlan entered promiscuous mode [ 246.909862][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.916956][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 246.923169][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 246.929498][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.936121][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.945335][ T5176] device veth1_macvtap entered promiscuous mode [ 246.952595][ T5175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 246.961084][ T5175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 246.971641][ T5175] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 247.000850][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.007172][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.013058][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.028583][ T5175] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.034876][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.034936][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.046827][ T5175] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.052945][ T5175] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.058977][ T5175] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.078955][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 247.084822][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 247.112752][ T5176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 247.121265][ T5176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.128759][ T5176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 247.136232][ T5176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.145085][ T5176] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 247.166657][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.174001][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.187539][ T5176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 247.197247][ T5176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.204971][ T5176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 247.212510][ T5176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.224725][ T5176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 247.234868][ T5176] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.242665][ T5176] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.250074][ T5176] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.256490][ T5176] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.272391][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.280842][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.307508][ T5188] device veth0_macvtap entered promiscuous mode [ 247.325323][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.335036][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.349227][ T5188] device veth1_macvtap entered promiscuous mode 20:36:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x0) [ 247.387056][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 247.396245][ T1231] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.415553][ T5201] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.423171][ T5201] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.430201][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 247.430224][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.430234][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 20:36:56 executing program 1: syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 247.430248][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.430259][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 247.430272][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.432068][ T5188] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 247.438539][ T5246] Zero length message leads to an empty skb 20:36:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f00000000c0)) [ 247.509972][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 247.517457][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.525196][ T5224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.538382][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 20:36:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@dev, @multicast1, 0xfffd}}) [ 247.549838][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.557766][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 247.566828][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.574754][ T5188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 247.581588][ T5188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.589659][ T5188] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 247.604068][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.610317][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.625612][ T5188] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.632686][ T5188] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.640162][ T5188] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.648727][ T5188] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 247.669712][ T5214] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.677978][ T5214] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.689685][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 247.705286][ T5201] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.715000][ T5201] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.723041][ T1368] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 247.750114][ T5201] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.763767][ T5201] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.773122][ T5221] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 247.798020][ T5254] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.805172][ T5254] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 247.823598][ T5253] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 247.838190][ T5214] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 247.844003][ T5214] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 20:36:57 executing program 0: sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) 20:36:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RLCREATE(r0, &(0x7f0000000400)={0x18}, 0x18) [ 247.851395][ T5253] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 20:36:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000340)) 20:36:57 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x802, 0x0) 20:36:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x19}}) 20:36:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080), 0x948273d6e4b9937d, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ff03b62e", @ANYRES16, @ANYBLOB="00012cbd7000fddbdf2501000000000000000c410000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x4001) 20:36:57 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) lseek(r0, 0x0, 0x0) 20:36:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@private1, @remote, 0x19, 0x20}}) 20:36:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @private}}}}) 20:36:57 executing program 2: socketpair(0x25, 0x1, 0x4eb, 0x0) 20:36:57 executing program 1: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)) 20:36:57 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 20:36:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="dfff"], 0x24}}, 0x0) 20:36:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={@private1, @remote, 0x19}}) 20:36:57 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x14, 0x453, 0x0, 0x0, 0x0, '?'}, 0x14}}, 0x0) 20:36:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="000000000000000000000001c0027293fd5cd4c001000000"], 0x24}}, 0x0) 20:36:57 executing program 3: clock_gettime(0x0, &(0x7f0000000800)) 20:36:57 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000f40)='ns/user\x00') [ 248.071949][ T39] audit: type=1107 audit(1674851817.234:2): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='?' 20:36:57 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={0x0}) [ 248.087962][ T5295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:36:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000340)={'sit0\x00', 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, 0x0, 0x40) r2 = socket$inet6(0xa, 0x80000, 0xb2) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000cc0)=@gcm_256={{0x304}, "98443b74253121f3", "f34bff31c32f946e62775c84388486853615ad686ff44092269f7e077c6ce483", "d523cd28", "3d9e21086fa5ae7e"}, 0x38) 20:36:57 executing program 1: pselect6(0x40, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)={0x5}, &(0x7f0000000840), 0x0) 20:36:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private0, 0x1}, 0x1c, 0x0}, 0x0) 20:36:57 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @local}, 0x10) 20:36:57 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840), &(0x7f00000008c0)={&(0x7f0000000880)={[0x8]}, 0x8}) 20:36:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3f) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) 20:36:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000009"], 0x24}}, 0x0) [ 248.230144][ T5316] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 248.413622][ T4548] Bluetooth: hci1: command 0x040f tx timeout [ 248.413773][ T5190] Bluetooth: hci0: command 0x040f tx timeout [ 248.424064][ T5182] Bluetooth: hci2: command 0x040f tx timeout [ 248.493679][ T4548] Bluetooth: hci3: command 0x040f tx timeout 20:36:58 executing program 3: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:36:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000180)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_LINK={0x8}]}, 0x75}}, 0x0) 20:36:58 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) 20:36:58 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x1c, 0x0, 0x0, 0x70bd28, 0x0, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x1c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x802, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), r1) 20:36:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000080), 0x1) connect$inet(r0, &(0x7f0000000000)={0xffffffffffffffd3, 0x2}, 0x10) 20:36:58 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000c40), 0xffffffffffffffff) 20:36:58 executing program 3: socketpair(0x22, 0x0, 0x5, 0x0) 20:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x2}]}, 0x24}}, 0x0) 20:36:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x38) 20:36:58 executing program 1: pipe2$9p(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000ac0)={0x7}, 0x7) write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0x18) [ 249.069196][ T5335] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 20:36:58 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), r0) 20:36:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000540)={'wpan0\x00'}) 20:36:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) 20:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2400000006d1cb"], 0x24}}, 0x0) 20:36:58 executing program 3: socketpair(0x15, 0x5, 0x4, 0x0) 20:36:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x71, 0x0, 0x0) 20:36:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}) 20:36:58 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840), 0x0) 20:36:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x6}]}, 0x24}}, 0x0) 20:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[], 0x24}}, 0x0) 20:36:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000980)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 20:36:58 executing program 1: socketpair(0x3, 0x0, 0x0, 0x0) 20:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x14, 0x0, 0x6ccd88e244818a9f}, 0x14}}, 0x0) 20:36:58 executing program 2: socket$inet6(0xa, 0x0, 0xb2) 20:36:58 executing program 3: pipe2$9p(&(0x7f0000000a80), 0x80000) 20:36:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000800), r0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x14, r1, 0x6ccd88e244818a9f}, 0x14}}, 0x0) 20:36:58 executing program 0: socketpair(0x1, 0x0, 0x34, 0x0) 20:36:58 executing program 3: socketpair(0x23, 0x0, 0xfffffffd, 0x0) 20:36:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) 20:36:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, 0x0) 20:36:58 executing program 1: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x440, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x530, 0x530, 0x530, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @dev, [], [], 'virt_wifi0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, [], [], 'batadv0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ipv6={@loopback, @mcast2, [], [], 'geneve0\x00', 'veth1_to_bond\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:tmpfs_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) 20:36:58 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000180)) 20:36:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002d00)=ANY=[], 0x2168}}, 0x0) 20:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000dc0)={'wpan4\x00'}) 20:36:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 20:36:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000340)={'sit0\x00', 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000000a00)={&(0x7f00000008c0), 0xc, 0x0}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000b80)={'sit0\x00', 0x0}) socket$inet6(0xa, 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x802, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000f40)='ns/user\x00') 20:36:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @private=0xa010101}}}}) 20:36:58 executing program 1: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0), 0x10) 20:36:58 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000ac0)={0x7}, 0x7) 20:36:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="ad"], 0x24}}, 0x0) [ 249.461251][ T5405] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:36:58 executing program 1: pipe2$9p(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000ac0)={0x7}, 0x7) 20:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0600065f"], 0x24}}, 0x0) 20:36:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000009c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"42b7a3d8912e0926b274f023f8346d2e"}}}}, 0xa0) 20:36:58 executing program 2: pipe2$9p(0x0, 0x104880) 20:36:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:36:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 20:36:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x6}]}, 0x24}}, 0x0) 20:36:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000b80), 0x4) 20:36:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000980)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000940), 0x106}}, 0x20) 20:36:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@dev, @multicast1}}) 20:36:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000480)={'batadv_slave_1\x00'}) 20:36:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000800), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:36:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000000140)={'gre0\x00', 0x0}) 20:36:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0, 0x24}}, 0x0) 20:36:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3f, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14}}, [""]}, 0x30}}, 0x0) 20:36:58 executing program 3: sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) 20:36:58 executing program 2: clock_gettime(0x0, &(0x7f0000000800)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={r0}, 0x0) 20:36:58 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) 20:36:58 executing program 0: sched_getparam(0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000009c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"42b7a3d8912e0926b274f023f8346d2e"}}}}, 0xa0) 20:36:58 executing program 1: socketpair(0xa, 0x1, 0x6, &(0x7f0000000840)) 20:36:58 executing program 3: sched_getparam(0xffffffffffffffff, &(0x7f0000000000)) sched_rr_get_interval(0x0, &(0x7f0000000040)) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x3c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x8}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x7}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8004}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000200)=@gcm_256={{0x303}, "d2a287b9c420aaf0", "10557e7b16b02870b3f3708dd80e8bb22e1190ce3511673a4ace891acb5243e7", "f35e05e6", "e0da004718e8f3ba"}, 0x38) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x3, &(0x7f0000000280)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x2, {0xa, 0x4e23, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2}}}, 0x38) r4 = getpid() syz_open_procfs$namespace(r4, &(0x7f0000000480)='ns/user\x00') ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x264) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000540)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r5, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000040}, 0x24004841) 20:36:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3f) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000000c0)={'wg1\x00'}) 20:36:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 20:36:58 executing program 1: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) [ 250.493898][ T4548] Bluetooth: hci2: command 0x0419 tx timeout [ 250.493950][ T5182] Bluetooth: hci1: command 0x0419 tx timeout [ 250.503760][ T5182] Bluetooth: hci0: command 0x0419 tx timeout 20:36:59 executing program 2: pipe2$9p(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RFLUSH(r0, &(0x7f00000008c0)={0x7}, 0x7) 20:36:59 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 20:36:59 executing program 3: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:36:59 executing program 1: clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000740), &(0x7f0000000780)={0x1400000000000000}, 0x0, &(0x7f0000000840)={0x0, r0+10000000}, 0x0) 20:36:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'sit0\x00', 0x0}) [ 250.573576][ T5190] Bluetooth: hci3: command 0x0419 tx timeout 20:36:59 executing program 3: ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000f40)='ns/user\x00') 20:36:59 executing program 2: socketpair(0x23, 0x0, 0x3, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(0x0, 0x0) 20:36:59 executing program 1: pselect6(0x40, &(0x7f0000000740), 0x0, 0x0, &(0x7f0000000840), 0x0) 20:36:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 20:36:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000440), &(0x7f0000000500)=0x98) 20:36:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), 0xffffffffffffffff) 20:36:59 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00'}) 20:36:59 executing program 1: socketpair(0x9, 0x0, 0x0, 0x0) 20:36:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', 0x0}) 20:36:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 20:36:59 executing program 2: pselect6(0x40, &(0x7f0000000740), 0x0, &(0x7f00000007c0)={0x5}, &(0x7f0000000840), 0x0) 20:36:59 executing program 0: socketpair(0x1e, 0x0, 0x9, 0x0) 20:36:59 executing program 1: pipe2$9p(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 20:36:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000d80)={'sit0\x00', 0x0}) 20:36:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 20:36:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0}, 0x0) 20:36:59 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580), 0xffffffffffffffff) 20:36:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'sit0\x00', &(0x7f00000003c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 20:36:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r1, 0x101, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) 20:36:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), r0) 20:37:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x5) 20:37:00 executing program 0: clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={r0, r1+10000000}, 0x0) 20:37:00 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_ifindex, @local}, 0x10) 20:37:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000b80), 0x4) 20:37:00 executing program 1: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r0, @ANYRES32, @ANYBLOB="08000500ac1414"], 0x4c}}, 0x0) 20:37:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x2168}}, 0x0) 20:37:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f00000001c0)=ANY=[]}) 20:37:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) 20:37:00 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000840), 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) [ 250.928814][ T5524] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:37:00 executing program 0: set_mempolicy(0x8000, &(0x7f0000000000), 0x0) 20:37:00 executing program 1: clock_gettime(0x3, &(0x7f0000000280)) 20:37:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) 20:37:00 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000e40)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) [ 251.695961][ T5531] tipc: Enabling of bearer rejected, failed to enable media 20:37:00 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000840), &(0x7f00000008c0)={&(0x7f0000000880)={[0x8]}, 0x8}) 20:37:00 executing program 2: syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 20:37:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='wit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="00800020000000810000ac4e41fd01040068000000049078ac1e0101ac"]}) 20:37:00 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000b80)=0x3, 0x4) 20:37:00 executing program 1: socketpair(0x0, 0xf, 0x0, 0x0) 20:37:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xd5, &(0x7f0000000080)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x24}}, 0x0) 20:37:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) 20:37:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', 0x0}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000f00), r0) 20:37:00 executing program 2: pselect6(0x40, &(0x7f0000000740), &(0x7f0000000780)={0x1400000000000000}, &(0x7f00000007c0), 0x0, 0x0) [ 251.807346][ T5550] tipc: Enabling of bearer rejected, failed to enable media 20:37:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'sit0\x00', &(0x7f00000003c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 20:37:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) 20:37:01 executing program 2: pselect6(0x40, &(0x7f0000000740), 0x0, &(0x7f00000007c0)={0x5}, 0x0, 0x0) 20:37:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_VERSION={0x8}]}, 0x24}}, 0x0) 20:37:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00800020000000810000ac4e41"]}) 20:37:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 20:37:01 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008051}, 0x0) 20:37:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000200)=@gcm_256={{}, "d2a287b9c420aaf0", "10557e7b16b02870b3f3708dd80e8bb22e1190ce3511673a4ace891acb5243e7", "f35e05e6", "e0da004718e8f3ba"}, 0x38) 20:37:01 executing program 3: syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000f40)='ns/user\x00') 20:37:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000000000000900", @ANYRES32=0x0, @ANYBLOB="0600060000000000"], 0x24}}, 0x10004850) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000000)=""/40, 0x28, 0x40000100, &(0x7f0000000040)={0x1a, 0x30e, 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 252.000146][ T5574] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=ANY=[@ANYBLOB="022f"], 0x24}}, 0x0) 20:37:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000980)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 20:37:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x14, r1, 0x1}, 0x14}}, 0x0) 20:37:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, r1/1000+60000}, 0x10) 20:37:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'erspan0\x00', 0x0}) 20:37:01 executing program 1: socketpair(0x28, 0x0, 0xff, 0x0) 20:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, 0x0, 0x0) 20:37:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, r1/1000+60000}, 0x10) 20:37:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) 20:37:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 20:37:02 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 252.829227][ T5592] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 20:37:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002d00)=ANY=[], 0x2168}}, 0x0) 20:37:02 executing program 1: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000a80), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000100000000000000000006000600", @ANYRES32, @ANYBLOB="08000500ac1414bb0600060000000000080002"], 0x4c}}, 0x0) 20:37:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, r1/1000+60000}, 0x10) [ 252.877875][ T5600] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:37:02 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:02 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000040)={0x0, r1/1000+60000}, 0x10) 20:37:02 executing program 1: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4018620d, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 252.916743][ T5605] loop2: detected capacity change from 0 to 128 [ 252.938831][ T5605] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 252.960332][ T5605] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:02 executing program 1: r0 = syz_clone(0x40080000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(r1, &(0x7f00000000c0)) tkill(r0, 0x2e) read$FUSE(0xffffffffffffffff, &(0x7f0000000680)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r3, &(0x7f0000000080)) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000140)) 20:37:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000003c0), 0x4) 20:37:02 executing program 0: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000006280), 0xffffffffffffffff) 20:37:02 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000006240)={&(0x7f0000005d00)={0x10, 0x0, 0x0, 0x804c89}, 0xc, &(0x7f0000006200)={&(0x7f0000005d80)={0x14}, 0x14}}, 0x0) [ 253.108436][ T5626] loop2: detected capacity change from 0 to 128 [ 253.115510][ T5626] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 253.129023][ T5626] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:02 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) 20:37:02 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa, 0x0, 0x96}) [ 253.291583][ T5634] loop2: detected capacity change from 0 to 128 [ 253.298828][ T5634] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:02 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) [ 253.314673][ T5634] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:02 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:02 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 253.411546][ T5646] loop2: detected capacity change from 0 to 128 [ 253.417796][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 253.437395][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 253.453985][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.461474][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 253.473370][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.481713][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 253.492711][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.505676][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 253.518136][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.535239][ T5646] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 253.562267][ T5646] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:02 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) 20:37:02 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) 20:37:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:02 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 253.753668][ T5660] loop2: detected capacity change from 0 to 128 [ 253.756486][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 253.775909][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 253.781646][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.786952][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 20:37:02 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) [ 253.795309][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 253.813123][ T5660] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 253.851133][ T5660] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 254.127164][ T5673] loop2: detected capacity change from 0 to 128 [ 254.156477][ T5673] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:03 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:03 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:03 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 254.219862][ T5673] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:03 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:03 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:03 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x204400, &(0x7f00000062c0)={[{@fat=@usefree}, {@dots}, {@nodots}, {@fat=@check_strict}, {@dots}, {@nodots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x3}}, {@fat=@uid}, {@fat=@debug}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x8}}, {@nodots}]}, 0x5, 0x22f, &(0x7f0000006600)="$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") acct(&(0x7f0000000140)='./file1\x00') [ 254.336256][ T5679] loop2: detected capacity change from 0 to 128 [ 254.359239][ T5679] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 254.361812][ T5682] loop1: detected capacity change from 0 to 128 [ 254.379066][ T5679] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 254.499954][ T5682] Process accounting resumed 20:37:03 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:03 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 254.538659][ T5689] loop2: detected capacity change from 0 to 128 [ 254.557567][ T5689] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 254.581440][ T5689] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:03 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000005bc0)={0x0, 0x0, 0x0}, 0x0) 20:37:03 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:03 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 254.721317][ T5698] loop2: detected capacity change from 0 to 128 [ 254.756926][ T5698] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 254.807712][ T5698] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 254.987904][ T5702] loop2: detected capacity change from 0 to 128 [ 254.995199][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 20:37:04 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:04 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:04 executing program 1: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) socket(0xa, 0x6, 0x8001) syz_genetlink_get_family_id$ethtool(&(0x7f0000000b80), 0xffffffffffffffff) [ 255.015468][ T5702] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 255.042741][ T5702] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:04 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:04 executing program 1: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 20:37:04 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 20:37:04 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:04 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:04 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000006300), 0x8) 20:37:04 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 20:37:04 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:04 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:04 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(&(0x7f00000062c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 20:37:04 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 255.563166][ T5743] loop2: detected capacity change from 0 to 128 20:37:04 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000b00), 0xffffffffffffffff) 20:37:04 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 255.589420][ T5743] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:04 executing program 1: socket(0xa, 0x0, 0x8001) [ 255.643545][ T5743] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:04 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:04 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000005bc0)={0x0, 0x0, &(0x7f0000005b80)={&(0x7f0000005900)={0x4c}, 0x4c}}, 0x0) [ 255.795099][ T5760] loop2: detected capacity change from 0 to 128 [ 255.810020][ T5760] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 255.824953][ T5760] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:05 executing program 1: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) 20:37:05 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:05 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 255.998441][ T5767] loop2: detected capacity change from 0 to 128 [ 256.015410][ T5185] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 20:37:05 executing program 1: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x0) socket(0x26, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) [ 256.034155][ T5767] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:05 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 256.051953][ T5767] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:05 executing program 1: syz_genetlink_get_family_id$tipc(&(0x7f00000062c0), 0xffffffffffffffff) 20:37:05 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 256.174015][ T5780] loop2: detected capacity change from 0 to 128 [ 256.185287][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 256.190720][ T5185] Buffer I/O error on dev loop2, logical block 0, async page read [ 256.211109][ T5780] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 256.241646][ T5780] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:05 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:05 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 20:37:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:05 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000005bc0)={&(0x7f00000058c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000005b80)={&(0x7f0000005900)={0x4c}, 0x4c}}, 0x0) 20:37:05 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 256.475302][ T5791] loop2: detected capacity change from 0 to 128 [ 256.486502][ T5791] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 256.502898][ T5791] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 20:37:05 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:05 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) [ 256.587618][ T5800] loop2: detected capacity change from 0 to 128 [ 256.595905][ T5800] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:05 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000b00), 0xffffffffffffffff) [ 256.604706][ T5800] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:05 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 256.656497][ T5808] loop2: detected capacity change from 0 to 128 [ 256.666999][ T5808] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 256.677771][ T5808] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:06 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000b00), 0xffffffffffffffff) socket(0xa, 0x0, 0x8001) syz_genetlink_get_family_id$ethtool(&(0x7f0000000b80), 0xffffffffffffffff) 20:37:06 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:06 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:06 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 256.911770][ T5815] loop2: detected capacity change from 0 to 128 [ 256.935733][ T5815] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 256.951597][ T5815] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 20:37:06 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:06 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 257.033054][ T5824] loop2: detected capacity change from 0 to 128 20:37:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002000)={&(0x7f0000001f00), 0xc, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c}, 0x1c}}, 0x0) [ 257.047417][ T5824] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 257.057678][ T5824] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:06 executing program 1: bpf$LINK_DETACH(0x22, &(0x7f0000002e00), 0x4) 20:37:06 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:06 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:06 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000006280), 0xffffffffffffffff) 20:37:06 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 257.355479][ T5840] loop2: detected capacity change from 0 to 128 20:37:06 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000005bc0)={0x0, 0x0, &(0x7f0000005b80)={0x0}}, 0x0) [ 257.381696][ T5840] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 257.404785][ T5840] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 20:37:06 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:06 executing program 1: sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2, 0x80000, 0x0, &(0x7f0000000a80)) [ 257.806677][ T5859] loop2: detected capacity change from 0 to 128 20:37:06 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a80)) syz_genetlink_get_family_id$fou(&(0x7f0000000b00), 0xffffffffffffffff) 20:37:06 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:06 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) [ 257.857304][ T5859] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 257.898169][ T5859] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:07 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:37:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 257.971859][ T5874] loop2: detected capacity change from 0 to 128 [ 257.988064][ T5874] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 257.998832][ T5874] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:07 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', 0x0) [ 258.207169][ T5882] loop2: detected capacity change from 0 to 128 [ 258.245182][ T5882] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 258.270947][ T5882] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:07 executing program 1: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) socketpair(0x39, 0x0, 0x0, &(0x7f00000002c0)) 20:37:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:07 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:37:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c}, 0x1c}}, 0x0) 20:37:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 258.397949][ T5895] loop2: detected capacity change from 0 to 128 [ 258.416171][ T5895] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 20:37:07 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000040), 0xfffffcc1) [ 258.432353][ T5895] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:37:07 executing program 2: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:37:07 executing program 1: mq_open(&(0x7f0000000040)='&[^\'\x00', 0x1e5fc617a7b3574c, 0x0, 0x0) 20:37:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x7f, 0x4, 0x3ff}]}) [ 258.533475][ T39] audit: type=1326 audit(1674851827.694:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=5907 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f17549 code=0x0 20:37:07 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) getdents(r0, 0x0, 0x0) 20:37:07 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 20:37:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 258.767584][ T39] audit: type=1800 audit(1674851827.934:4): pid=5915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1159 res=0 errno=0 20:37:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000000)=@generic={0x0, 0x9}) 20:37:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000940), r0) 20:37:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890c, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8931, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x300, 0x0, &(0x7f0000000100)) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40305839, 0x0) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 259.212954][ T39] audit: type=1800 audit(1674851828.374:5): pid=5943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1159 res=0 errno=0 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1a, 0x0, &(0x7f0000000040)) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:08 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x18) unlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8993, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 259.684635][ T5979] 9pnet_fd: Insufficient options for proto=fd 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 259.744707][ T5986] 9pnet_fd: Insufficient options for proto=fd 20:37:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:08 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) 20:37:08 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) unlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) [ 259.810804][ T39] audit: type=1800 audit(1674851828.974:6): pid=5992 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1159 res=0 errno=0 [ 259.840640][ T5993] 9pnet_fd: Insufficient options for proto=fd 20:37:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x0, 0x0, 0x0, 0xed0}, 0x48) 20:37:09 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:09 executing program 0: getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:09 executing program 1: sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd}, 0x14}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "ab21e50cc4a9316f8a726cfc7f712947af53cb72baaa9d123cc8ad4e0622584e9739d2cab091f6806c1a7ed75d335e3c28f470f7e63c7f572322aafb642439cf", "38dbb2582ef897ca1a920971df56e2945b1db2b04407082501fd47b11dc181af"}) 20:37:09 executing program 0: getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x43, 0x0, &(0x7f0000000040)) 20:37:09 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:09 executing program 1: timer_create(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_gettime(0x0, &(0x7f0000000080)) 20:37:09 executing program 0: getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1e, 0x0, &(0x7f0000000040)) 20:37:09 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 20:37:09 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 260.339051][ T6034] 9pnet_fd: Insufficient options for proto=fd 20:37:09 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:09 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x800c6613, 0x0) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 20:37:09 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 260.554712][ T6042] 9pnet_fd: Insufficient options for proto=fd [ 260.560721][ T39] audit: type=1800 audit(1674851829.724:7): pid=6044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1160 res=0 errno=0 20:37:09 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:09 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x18) statx(r0, &(0x7f0000000440)='./file1\x00', 0x0, 0x0, 0x0) 20:37:09 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 20:37:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x24, 0x0, &(0x7f0000000040)) [ 260.618373][ T6053] 9pnet_fd: Insufficient options for proto=fd 20:37:10 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:10 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x280, 0x118, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x200, 0xffffffff, 0xffffffff, 0x200, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, [], [], 'syzkaller1\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @remote}, [], [], 'veth0_vlan\x00', 'wg2\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "84f0501d6b6d69a9ee1cdf530478ca8467ceb9562f49fe22f099139873a4"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e0) 20:37:10 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x7f, 0x0, 0x3ff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000e00)={0x77359400}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x2, r3, 0xd8c6, 0x80000}) getsockopt$sock_int(r0, 0x1, 0x3, 0x0, &(0x7f0000000040)) 20:37:10 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:10 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 260.964173][ T39] audit: type=1326 audit(1674851830.134:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=6075 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f17549 code=0x0 20:37:10 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 20:37:10 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 261.071617][ T6085] 9pnet_fd: Insufficient options for proto=fd 20:37:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) [ 261.143152][ T6091] 9pnet_fd: Insufficient options for proto=fd 20:37:10 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) [ 261.385467][ T1321] ieee802154 phy0 wpan0: encryption failed: -22 [ 261.390609][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 20:37:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x7f, 0x0, 0x3ff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000e00)={0x77359400}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x2, r3, 0xd8c6, 0x80000}) getsockopt$sock_int(r0, 0x1, 0x3, 0x0, &(0x7f0000000040)) 20:37:10 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r0 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 20:37:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) [ 261.811106][ T6100] 9pnet_fd: Insufficient options for proto=fd 20:37:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:11 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 261.834629][ T39] audit: type=1326 audit(1674851831.004:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=6102 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f17549 code=0x0 20:37:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:37:11 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:11 executing program 3: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x6, 0x0}) 20:37:11 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:11 executing program 3: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) 20:37:11 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 3: unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: faccessat2(0xffffffffffffff9c, &(0x7f00000004c0)='.\x00', 0x0, 0x0) 20:37:12 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40305828, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 262.969613][ T39] audit: type=1800 audit(1674851832.144:10): pid=6149 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1164 res=0 errno=0 20:37:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="b0000000031401"], 0xb0}}, 0x0) [ 263.030422][ T6159] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.1'. 20:37:12 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map, 0xffffffffffffffff, 0x26}, 0x14) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8901, &(0x7f0000000140)=@get={0x7, 0x0}) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file0\x00', 0x0, 0x0) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(0xffffffffffffffff) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3, 0x0, &(0x7f0000000040)) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000e00)={0x77359400}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='geneve0\x00'}) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 3: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB='\f\x00\x00\x00'], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB='\f\x00\x00\x00'], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 3: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:12 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:12 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB='\f\x00\x00\x00'], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:12 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:12 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:13 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:13 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:13 executing program 3: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:37:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:13 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:13 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:13 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:13 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 264.866179][ T6279] 9pnet_fd: Insufficient options for proto=fd 20:37:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:14 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:14 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:14 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 264.964275][ T6288] 9pnet_fd: Insufficient options for proto=fd 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:14 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 265.518850][ T6304] 9pnet_fd: Insufficient options for proto=fd 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:14 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:14 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(0x0) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:14 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:15 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:15 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(0x0) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:15 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(0x0) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:15 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:15 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:15 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:16 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:16 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:16 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:16 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:16 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 20:37:16 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:16 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:16 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 20:37:17 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:17 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:17 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) [ 268.328667][ T6417] 9pnet_fd: Insufficient options for proto=fd 20:37:17 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) [ 268.469830][ T6427] 9pnet_fd: Insufficient options for proto=fd 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:17 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r1 = dup(r0) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 20:37:17 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 268.656981][ T6433] 9pnet_fd: Insufficient options for proto=fd 20:37:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:17 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:17 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 268.944558][ T6443] 9pnet_fd: Insufficient options for proto=fd 20:37:18 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 269.079522][ T6456] 9pnet_fd: Insufficient options for proto=fd 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}}) 20:37:18 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 269.141680][ T6464] 9pnet_fd: Insufficient options for proto=fd 20:37:18 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:18 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 2: sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="0c010000", @ANYRES16, @ANYBLOB="00032abd700008"], 0x10c}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0xffff80fe, 0x0}) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:18 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:18 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x60, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ipvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge_slave_0\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x50041}, 0x0) 20:37:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:18 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 269.712218][ T6481] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 269.745712][ T6481] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:19 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:19 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x60, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ipvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge_slave_0\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x50041}, 0x0) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) 20:37:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) write(r0, &(0x7f0000000300)='9', 0x1) read$FUSE(r0, &(0x7f0000002380)={0x2020}, 0x2020) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) 20:37:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000040)='wg1\x00'}) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x10, 0x0, &(0x7f0000000040)) 20:37:19 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8990, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:19 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x5c}}, 0x0) 20:37:19 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, 0x0) 20:37:19 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:19 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6609, 0x0) 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) 20:37:19 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x801c581f, 0x0) [ 270.759114][ T39] audit: type=1800 audit(1674851839.924:11): pid=6556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1152 res=0 errno=0 20:37:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) 20:37:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x74, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x74}}, 0x0) [ 270.841044][ T39] audit: type=1800 audit(1674851840.004:12): pid=6565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, 0x0) 20:37:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8936, 0x0) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, 0x0) 20:37:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000000)=@generic) 20:37:20 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:20 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000002240), 0xffffffffffffffff) 20:37:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000b40)={&(0x7f0000000a40), 0xffffffffffffffbd, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x6}]}, 0x24}}, 0x0) [ 271.256428][ T6593] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:37:20 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x1018}, './file0\x00'}) 20:37:20 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 271.411836][ T6599] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:37:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@bridge_setlink={0x20, 0x13, 0x1}, 0x20}}, 0x0) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:20 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x4030582b, 0x0) 20:37:20 executing program 2: mq_open(&(0x7f0000000000)='\'!-@-\x00', 0x40, 0x0, &(0x7f0000000080)={0x7, 0x8000000000000000, 0xff, 0x655}) [ 271.512398][ T39] audit: type=1800 audit(1674851840.674:13): pid=6606 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1149 res=0 errno=0 20:37:20 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x8040}, 0x18) [ 271.547484][ T39] audit: type=1800 audit(1674851840.714:14): pid=6609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1159 res=0 errno=0 20:37:20 executing program 1: sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="0c010000", @ANYRES16, @ANYBLOB="00032a"], 0x10c}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0xffff80fe, 0x0}) [ 271.600676][ T6612] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:37:20 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x8, 0x0, &(0x7f0000000040)) 20:37:20 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@generic={0x0, 0x2}]}}}}}) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8904, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:20 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) 20:37:20 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x42, 0x0, &(0x7f0000000040)) [ 271.734075][ T39] audit: type=1800 audit(1674851840.904:15): pid=6629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1156 res=0 errno=0 20:37:21 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 1: syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000004c0)=[&(0x7f00000002c0)='!\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='+\xc7(%/\x00', &(0x7f0000000380)='*\x00', &(0x7f00000003c0)='!.\'\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='^+-^'], 0x0) 20:37:21 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8010661b, 0x0) [ 271.894454][ T39] audit: type=1800 audit(1674851841.064:16): pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1159 res=0 errno=0 [ 271.918275][ T6643] process 'syz-executor.1' launched '/dev/fd/-1/./file0' with NULL argv: empty string added 20:37:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89a1, &(0x7f0000000140)=@get={0x300, 0x0}) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xa, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140e, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}]}, 0x30}}, 0x0) 20:37:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$alg(r0, 0x0, 0x0) 20:37:21 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x180, 0xffffffff, 0xffffffff, 0x180, 0xffffffff, 0x2a0, 0xffffffff, 0xffffffff, 0x2a0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ipv6={@loopback, @mcast2, [], [], 'wlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@get={0x1, 0x0, 0x100000000}) 20:37:21 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc028660f, 0x0) 20:37:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8983, 0x0) [ 272.132154][ T39] audit: type=1800 audit(1674851841.294:17): pid=6668 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8949, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8991, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:21 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x31, 0x0, &(0x7f0000000040)) 20:37:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x22, 0x0, &(0x7f0000000040)) 20:37:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xd, 0x0, &(0x7f0000000040)) 20:37:21 executing program 2: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0xee00, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:37:21 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, 0x0) 20:37:21 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:21 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:21 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x0, 0x13, r0, 0x0) 20:37:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8970, &(0x7f0000000140)=@get={0x1, 0x0}) [ 272.856964][ T6719] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:37:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8932, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:22 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 20:37:22 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x2, &(0x7f0000000000)=""/7}) [ 273.358844][ T39] audit: type=1800 audit(1674851842.524:18): pid=6738 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8914, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:22 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24020000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf2542"], 0x224}}, 0x0) 20:37:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24020000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf254200000008"], 0x224}}, 0x0) 20:37:22 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8948, &(0x7f0000000140)=@get={0x1, 0x0}) [ 273.557811][ T6755] netlink: 528 bytes leftover after parsing attributes in process `syz-executor.2'. 20:37:22 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0c0583b, 0x0) 20:37:22 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0185879, 0x0) [ 273.718318][ T39] audit: type=1800 audit(1674851842.884:19): pid=6766 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:22 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x80086601, 0x0) [ 273.765404][ T39] audit: type=1800 audit(1674851842.884:20): pid=6767 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1164 res=0 errno=0 20:37:22 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x13, 0x0, &(0x7f0000000040)) 20:37:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) 20:37:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3b, 0x0, &(0x7f0000000040)) [ 274.208186][ T6786] fuse: Bad value for 'fd' 20:37:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x48, 0x0, &(0x7f0000000040)) 20:37:23 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="f4"], 0x0, 0x0, 0x0) 20:37:23 executing program 1: syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 20:37:23 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc020660b, 0x0) 20:37:23 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89b1, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:24 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:24 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:24 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:24 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup, 0xffffffffffffffff, 0x1d}, 0x14) 20:37:24 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:24 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x7f, 0x4, 0x3ff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000e00)={0x77359400}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x2, r3, 0xd8c6, 0x80000}) getsockopt$sock_int(r0, 0x1, 0x3, 0x0, &(0x7f0000000040)) 20:37:24 executing program 1: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 20:37:24 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:24 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x7434, 0x0) 20:37:24 executing program 1: unshare(0x12000100) 20:37:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x47, 0x0, &(0x7f0000000040)) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8903, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:25 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340)={0x9}, 0x0, 0x0, 0x0) 20:37:25 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) 20:37:25 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) 20:37:25 executing program 2: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) 20:37:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89a3, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x0, 0x40010, r0, 0x0) 20:37:25 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x400c6615, 0x0) [ 276.162205][ T39] kauditd_printk_skb: 4 callbacks suppressed [ 276.162332][ T39] audit: type=1800 audit(1674851845.324:25): pid=6857 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:25 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}]}, 0x38}}, 0x0) 20:37:25 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:25 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @mcast1}}) 20:37:25 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0046686, 0x0) [ 276.340611][ T39] audit: type=1800 audit(1674851845.504:26): pid=6873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:25 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 20:37:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5000}}, 0x0, 0x0, 0x0) 20:37:25 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6611, 0x0) [ 276.380154][ T6878] fuse: Invalid rootmode [ 276.389845][ T39] audit: type=1800 audit(1674851845.554:27): pid=6880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1164 res=0 errno=0 20:37:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3, 0x0, 0x0, 0x80}]}) 20:37:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni-avx2\x00'}, 0x58) 20:37:25 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='hsr0\x00'}) 20:37:25 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8930, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xc, 0x0, &(0x7f0000000040)) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x45, 0x0, &(0x7f0000000040)) 20:37:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8902, 0x0) 20:37:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8921, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:25 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x4, 0x10, r0, 0x0) 20:37:26 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x541b, 0x0) [ 276.842424][ T39] audit: type=1800 audit(1674851846.004:28): pid=6915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:26 executing program 0: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) 20:37:26 executing program 3: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) 20:37:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x19, 0x0, &(0x7f0000000040)) 20:37:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8901, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24020000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf2542000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000005"], 0x224}}, 0x0) 20:37:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8947, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:26 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="407b19c05f866a25"}}) [ 276.995032][ T39] audit: type=1800 audit(1674851846.164:29): pid=6933 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:26 executing program 3: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:26 executing program 3: unshare(0x40000000) 20:37:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8918, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:26 executing program 0: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x8000000000000000}) 20:37:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}) 20:37:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x37, 0x0, &(0x7f0000000040)) 20:37:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x8000000000000000}) 20:37:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89a0, &(0x7f0000000140)=@get={0x1, &(0x7f0000000000)=""/7, 0x6}) 20:37:27 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, 0x0) [ 278.008360][ T39] audit: type=1800 audit(1674851847.174:30): pid=6960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:27 executing program 3: unshare(0x0) 20:37:27 executing program 0: unshare(0x40000000) 20:37:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) 20:37:27 executing program 3: unshare(0x0) 20:37:27 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:27 executing program 3: unshare(0x0) 20:37:27 executing program 0: unshare(0x0) 20:37:27 executing program 2: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:28 executing program 0: unshare(0x0) 20:37:29 executing program 2: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:29 executing program 0: unshare(0x0) 20:37:29 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89a2, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:29 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:37:29 executing program 2: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x28, 0x0, &(0x7f0000000040)) 20:37:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8983, &(0x7f0000000140)=@get={0x300, 0x0}) 20:37:29 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x80087601, 0x0) [ 280.753409][ T39] audit: type=1800 audit(1674851849.914:31): pid=7017 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 20:37:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/155, &(0x7f0000000000)=0xffffffa6) 20:37:30 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) 20:37:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xe, 0x0, &(0x7f0000000040)) 20:37:30 executing program 2: unshare(0x40000000) 20:37:30 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map, 0xffffffffffffffff, 0xd}, 0x14) 20:37:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8924, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x894a, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:30 executing program 2: unshare(0x0) 20:37:30 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:37:30 executing program 2: unshare(0x0) 20:37:30 executing program 2: unshare(0x0) 20:37:30 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:37:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8982, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:31 executing program 1: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) 20:37:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x6, 0x0, &(0x7f0000000040)) 20:37:31 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x660c, 0x0) [ 281.856921][ T39] audit: type=1800 audit(1674851851.024:32): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1158 res=0 errno=0 20:37:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89b0, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x0, 0xea60}, 0xa) 20:37:31 executing program 2: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:37:31 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:31 executing program 1: unshare(0x40000000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 20:37:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:31 executing program 1: unshare(0x40000000) 20:37:31 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8943, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 2: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:32 executing program 1: unshare(0x0) 20:37:32 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:32 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:32 executing program 1: unshare(0x0) 20:37:32 executing program 1: unshare(0x0) 20:37:32 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:32 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) 20:37:32 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001114ff"], 0x28}}, 0x0) 20:37:32 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:33 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) [ 283.841090][ T7130] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:33 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:33 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000e40), 0x0, 0x0, 0x0, 0xfffffffffffffffd) faccessat(0xffffffffffffffff, 0x0, 0x0) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffff9) r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000000)='netdevsim0\x00'}) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8908, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:33 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8902, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x29, 0x0, &(0x7f0000000040)) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 1: r0 = shmget(0x2, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8901, 0x0) shmctl$SHM_STAT_ANY(0x0, 0xf, 0x0) 20:37:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000000)=""/7}) 20:37:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8912, 0x0) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x3ff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, 0x0, 0x0) 20:37:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x2f, 0x0, &(0x7f0000000040)) [ 284.730760][ T39] audit: type=1326 audit(1674851853.894:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=7177 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f32549 code=0x0 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{}, {0x2}]}) 20:37:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:35 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) 20:37:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8920, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 286.519835][ T39] audit: type=1800 audit(1674851855.684:34): pid=7199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8995, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x80108907, 0x0) 20:37:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x28, 0x0, &(0x7f0000000040)=0x4) 20:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8946, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f00000005c0)='./file1/file0\x00', &(0x7f0000000640), 0x0) 20:37:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x44, r4, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r4, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@handle=@pci={{0x8}, {0x11}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='pimreg0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x6, 0x0, &(0x7f0000000380)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r5, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1f8, r4, 0x800, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x181}, {0x6, 0x11, 0x5b7d}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x3ff}, {0x6, 0x11, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x80000000}, {0x6, 0x11, 0x401}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1ff}, {0x6, 0x11, 0x951}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0xc000}, {0x6, 0x11, 0x9}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4abdcdf7}, {0x6, 0x11, 0xc5ea}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0xa689}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8001}, {0x6, 0x11, 0x3}}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@generic={0x2, 0xffffffffffffec9f}) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0xc01047d0, 0x0) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x39, 0x0, &(0x7f0000000040)) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 1: pkey_mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0xffffffffffffffff) 20:37:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x4020940d, &(0x7f0000000000)=@generic={0x3}) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x78}}, 0x0) 20:37:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x49, 0x0, &(0x7f0000000040)) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x891d, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:36 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x100000b, 0x10, r0, 0x0) 20:37:36 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001114ff43"], 0x28}}, 0x0) 20:37:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) [ 287.573220][ T7272] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:36 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x88, 0xb, 0x0, &(0x7f0000000380)) 20:37:37 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) futimesat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={{0x77359400}, {0x0, 0xea60}}) 20:37:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x4020940d, &(0x7f0000000140)=@get={0x300, 0x0}) [ 288.403583][ T39] audit: type=1800 audit(1674851857.574:35): pid=7285 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x89a0, 0x0) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x68}}, 0x0) 20:37:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x15, 0x0, &(0x7f0000000040)) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x60, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x4}]}, 0x60}}, 0x0) 20:37:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x5411, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x7, 0x13, r0, 0x0) 20:37:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x5452, &(0x7f0000000140)=@generic) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x60, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x4}]}, 0x60}}, 0x0) 20:37:37 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) futimesat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0) [ 288.643923][ T39] audit: type=1800 audit(1674851857.814:36): pid=7313 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:37 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc020662a, 0x0) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x60, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x4}]}, 0x60}}, 0x0) 20:37:37 executing program 1: utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, 0xf6e5947cdbf5dc4d) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) [ 288.798569][ T39] audit: type=1800 audit(1674851857.964:37): pid=7318 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x1000)=nil, 0x930, 0x0, 0x11, r0, 0x0) 20:37:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) 20:37:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) 20:37:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8918, 0x0) 20:37:38 executing program 1: mq_open(&(0x7f00000002c0)='.log\x00', 0x0, 0x0, 0x0) 20:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:38 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x401c5820, 0x0) [ 288.941916][ T39] audit: type=1800 audit(1674851858.104:38): pid=7339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1151 res=0 errno=0 20:37:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x891e, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8916, 0x0) 20:37:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x70}}, 0x0) 20:37:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) 20:37:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) 20:37:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8936, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:39 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) 20:37:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8913, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:39 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:39 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) 20:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:41 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) 20:37:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8922, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:41 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x44}}, 0x0) 20:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:41 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) 20:37:42 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14}}}}) 20:37:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 20:37:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x5c}}, 0x0) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24020000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf2542000000080001"], 0x224}}, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x54}}, 0x0) [ 293.035529][ T7436] netlink: 520 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:37:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x5452, &(0x7f0000000000)=@add_del={0x2, 0x0}) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x54}}, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f0000000040)) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1600bd60, 0x0, &(0x7f0000000040)) 20:37:42 executing program 2: shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) shmget(0x2, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x6c}}, 0x0) 20:37:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x30, 0x0, &(0x7f0000000040)) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:42 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000002180)=""/4100) 20:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x3ff}]}) 20:37:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:42 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40086604, 0x0) [ 293.815684][ T39] audit: type=1326 audit(1674851862.984:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=7476 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f32549 code=0x0 20:37:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8982, &(0x7f0000000140)=@get={0x7, 0x0}) 20:37:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x64}}, 0x0) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) [ 293.886118][ T39] audit: type=1800 audit(1674851863.054:40): pid=7481 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1151 res=0 errno=0 20:37:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x891f, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:43 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x0, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x180, 0x428, 0xffffffff, 0x0, 0x0, 0x548, 0x548, 0xffffffff, 0x548, 0x548, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@private1, @ipv6=@private1, @port, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4, @ipv6=@empty, @port, @gre_key}}}, {{@ipv6={@empty, @loopback, [], [], 'bridge_slave_0\x00', 'ip6tnl0\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@remote, @gre_key, @icmp_id}}}, {{@ipv6={@mcast1, @mcast2, [], [], 'wlan0\x00', 'ip6erspan0\x00', {}, {}, 0x0, 0x0, 0xb3ef3ca1fdd351b}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@empty, @ipv4, @port, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 20:37:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{}, {0x5}]}) 20:37:43 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40086602, 0x0) [ 294.143090][ T39] audit: type=1800 audit(1674851863.304:41): pid=7502 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000000)=""/7, 0x6}) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'gretap0\x00', 0x0}) 20:37:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) 20:37:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8994, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:43 executing program 0: socketpair(0xa, 0x0, 0x7fc0, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x14, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}]}]}, 0x78}}, 0x0) 20:37:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8907, 0x0) 20:37:43 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x80086603, 0x0) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x3, &(0x7f0000000000)=""/7}) 20:37:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) [ 294.485574][ T39] audit: type=1800 audit(1674851863.654:42): pid=7524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1149 res=0 errno=0 20:37:43 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40305829, 0x0) [ 294.558462][ T39] audit: type=1800 audit(1674851863.724:43): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1155 res=0 errno=0 20:37:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8906, 0x0) 20:37:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0xffff80fe, 0x0}) 20:37:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xa, 0x0, &(0x7f0000000040)) 20:37:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 20:37:44 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-arm64\x00'}, 0x58) 20:37:44 executing program 0: socketpair(0xa, 0x0, 0x7fc0, &(0x7f0000000100)) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0xffffffffffffffff) 20:37:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8927, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x70}}, 0x0) 20:37:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3e, 0x0, &(0x7f0000000040)) 20:37:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x68}}, 0x0) 20:37:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x0, 0x10, r0, 0x0) 20:37:45 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6612, 0x0) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x68}}, 0x0) 20:37:45 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)=@v1={0x0, @aes256, 0x0, @auto="18820b82eeed16a3"}) [ 295.910304][ T39] audit: type=1800 audit(1674851865.074:44): pid=7561 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1151 res=0 errno=0 20:37:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8912, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x4}]}, 0x68}}, 0x0) 20:37:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8910, &(0x7f0000000140)=@get={0x1, 0x0}) [ 295.939725][ T39] audit: type=1800 audit(1674851865.094:45): pid=7565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1164 res=0 errno=0 20:37:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x5452, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:45 executing program 2: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={@id={0x2, 0x0, @a}}) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x68}}, 0x0) 20:37:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8901, &(0x7f0000000000)=@generic={0x68706684b341fff3}) [ 295.991233][ T39] audit: type=1800 audit(1674851865.154:46): pid=7572 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=1148 res=0 errno=0 20:37:45 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x18) unlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x200) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x68}}, 0x0) 20:37:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x9, 0x0, &(0x7f0000000040)) 20:37:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3c, 0x0, &(0x7f0000000040)) 20:37:45 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40806685, 0x0) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x68}}, 0x0) 20:37:45 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40087602, 0x0) 20:37:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8942, &(0x7f0000000140)=@get={0x1, 0x0}) [ 296.438394][ T39] audit: type=1800 audit(1674851865.604:47): pid=7590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1159 res=0 errno=0 [ 296.476072][ T39] audit: type=1800 audit(1674851865.634:48): pid=7594 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1164 res=0 errno=0 20:37:45 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x6628, 0x0) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) 20:37:45 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 20:37:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8901, &(0x7f0000000140)=@generic) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) 20:37:45 executing program 3: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x21}, 0x18) 20:37:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8911, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24020000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf2542000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000500830001000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000500830000000000080001007063690011000200303030303a30303a31302e3000000000050087006c"], 0x224}}, 0x0) 20:37:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) 20:37:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000640)={'gre0\x00', &(0x7f00000005c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}}}) 20:37:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x9, 0x3, 0x2e8, 0x138, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x268, 0xffffffff, 0xffffffff, 0x268, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, [], [], 'pim6reg1\x00', 'gretap0\x00', {}, {}, 0x0, 0x0, 0x4447da6a67004780}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@private0}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 20:37:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000140)=@get={0xffffc0fe, 0x0}) 20:37:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8971, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:47 executing program 2: socket$inet6(0xa, 0xa14e506b16f5bc, 0x0) 20:37:47 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0096616, 0x0) 20:37:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:47 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) 20:37:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) 20:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x44, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xffffffffffffff54, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x44}}, 0x0) [ 298.764444][ T7638] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 20:37:48 executing program 3: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40086607, 0x0) 20:37:48 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)={0x2, 0x0, @a}, 0x48, 0xfffffffffffffffb) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x3d, 0x0, &(0x7f0000000040)) [ 298.876683][ T39] kauditd_printk_skb: 3 callbacks suppressed [ 298.876766][ T39] audit: type=1800 audit(1674851868.044:52): pid=7642 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file1" dev="sda1" ino=1152 res=0 errno=0 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x38, 0x0, &(0x7f0000000040)) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) 20:37:48 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x1051c1}, 0x18) 20:37:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8983, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x8000000000000000, 0x9}) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) 20:37:48 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x5460, 0x0) 20:37:48 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101402, 0x0) write$tun(r0, 0x0, 0x2e) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) [ 299.007304][ T39] audit: type=1800 audit(1674851868.174:53): pid=7663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1159 res=0 errno=0 20:37:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890c, 0x0) 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8937, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x4c}}, 0x0) 20:37:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 20:37:48 executing program 3: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={0x4240, 0x0, 0x21}, 0x18) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8916, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8923, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:48 executing program 3: mq_open(&(0x7f00000000c0)='$*\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:37:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) 20:37:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x64}}, 0x0) 20:37:48 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000003000/0x2000)=nil, 0x930, 0x0, 0x80013, r0, 0x0) 20:37:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x80108906, 0x0) [ 299.756418][ T39] audit: type=1326 audit(1674851868.924:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=7692 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f3f549 code=0x0 20:37:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8901, &(0x7f0000000140)=@get={0x3ffff, 0x0}) 20:37:49 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 20:37:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x894c, 0x0) 20:37:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) 20:37:49 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0x11}, 0x14) 20:37:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='pim6reg0\x00'}) 20:37:49 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) unlinkat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x200) 20:37:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) [ 300.290343][ T39] audit: type=1800 audit(1674851869.454:55): pid=7707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1151 res=0 errno=0 20:37:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}]}, 0x5c}}, 0x0) 20:37:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8929, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x14, 0x0, &(0x7f0000000040)) 20:37:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x8992, &(0x7f0000000140)=@get={0x1, 0x0}) 20:37:49 executing program 1: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x86642}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x660c, 0x0) [ 300.419273][ T39] audit: type=1800 audit(1674851869.584:56): pid=7721 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=1163 res=0 errno=0 20:37:49 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x1000)=nil, 0x930, 0x80000f, 0x11, r0, 0x0) 20:37:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFBR(r0, 0x890b, &(0x7f0000000000)=@add_del={0x2, &(0x7f0000000040)='bond_slave_0\x00'}) 20:37:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000100000000090000000e0001006e6574646553ce0c60e9"], 0x44}}, 0x0) 20:37:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={&(0x7f0000001dc0)={0xe0c, 0x1, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x6d, 0x8, 0x0, 0x0, 'syz0\x00', "093cbe2418ce34878dc8e5b68c7690072879eacece0c881d10037c2a236479bf", "de9d9025f803795124c7990e91782102fff82c17cacdf3ec154b061bcd99ef9d", [{0x0, 0x6}, {}, {0x1697}, {}, {0x0, 0x0, {0x0, 0xfffffff7}}, {0x7ff, 0x200}, {}, {0x0, 0x0, {0x0, 0x942}}, {0xeac1, 0x40, {0x3}}, {0x0, 0x5}, {0x8}, {}, {0x0, 0x200}, {}, {}, {}, {0x0, 0x8000}, {}, {0x502}, {}, {}, {}, {0x2, 0x0, {0x3, 0x17}}, {}, {}, {}, {}, {0x7}, {0x0, 0x4}, {0x6}, {}, {0x0, 0x0, {0x0, 0x6}}, {0x0, 0x5}, {}, {}, {}, {0x0, 0x0, {0x2}}, {0x401, 0x8}]}}}, {{0x254, 0x1, {{}, 0x81, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "c2208207b31a4b794c5afd05afec378ffac0ed21ffec1004ffb10a2a411c3aff", "8db446f27c474b26aaba29e5c11ceeeed62cb97ab5e15638b4ff5082dfcb3655", [{0x0, 0x0, {0x0, 0xffffc095}}, {0x0, 0x3}, {}, {0x9ff}, {0x0, 0x0, {0x2}}, {0x0, 0x0, {0x0, 0x5}}, {}, {}, {0x5, 0x8}, {0x0, 0x0, {0x0, 0x1}}, {}, {0x2}, {}, {}, {0x0, 0x401, {0x1}}, {}, {}, {}, {}, {0x0, 0x1}, {0x8}, {}, {0x0, 0x0, {0x0, 0x6fa}}, {0x34d, 0x7fff}, {0x1, 0x0, {0x1, 0x38c0000}}, {}, {0x0, 0x4}, {}, {0x0, 0x0, {0xf68265e26309f0f8}}, {}, {0x0, 0x0, {0x0, 0xb}}, {}, {}, {}, {}, {0x0, 0x8}, {}, {0x664}, {0x1, 0x0, {0x2, 0x3}}, {0x0, 0x0, {0x0, 0x6}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x20, 0x0, 0x0, 0x0, 'syz1\x00', "b23f77ad12a8680adecf87da13c55ba58162994178f82624c283c631d4d43ad4", "ed6fcb817d30cbe875f4002aba1ad27de47b8366ba6117221165ca9b175e211e", [{}, {}, {}, {}, {0x101, 0x0, {0x1}}, {}, {}, {}, {}, {0x0, 0x200}, {0x7}, {0x0, 0x0, {0x0, 0x1}}, {0x0, 0x100}, {}, {0x0, 0x0, {0x0, 0xb83}}, {0x101, 0x9}, {0x9}, {}, {}, {0x0, 0x9, {0x1}}, {}, {0x7}, {}, {0x0, 0x0, {0x1}}, {0x1ff, 0x7ff}, {0x8, 0x0, {0x0, 0x2}}, {}, {0x0, 0x0, {0x3}}, {0x0, 0x4}, {0x8}, {}, {}, {0x0, 0x2}, {0x0, 0x8}, {0x0, 0x0, {0x0, 0xd789}}, {}, {0x0, 0x0, {0x0, 0x40000000}}, {}, {0x98a, 0xff00, {0x0, 0x4}}, {0x0, 0x0, {0x0, 0x80000001}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "3278e9a5bf0e1914d9f436973191ff401f77263fd2ed32b967243d474298ba27", "c493c66eba86a9b9d29c2f54d05e94f995735cc84cebf3bd5da942aa00ad7618", [{0x0, 0x6}, {}, {0x6, 0x96}, {0x0, 0x7}, {}, {}, {}, {}, {0x0, 0x7, {0x3, 0xfc}}, {}, {}, {0x0, 0x0, {0x0, 0x6}}, {}, {0x0, 0x0, {0x3}}, {}, {0x0, 0x0, {0x0, 0x90}}, {}, {0x0, 0x0, {0x0, 0x3}}, {0x0, 0x0, {0x0, 0x9cdd}}, {}, {}, {}, {}, {0xff}, {0x0, 0x0, {0x2, 0x4}}, {}, {}, {0x3}, {0x0, 0x200, {0x1}}, {0x0, 0x1}, {}, {}, {}, {}, {0x75a}, {}, {0x800, 0x8000}, {}, {0x0, 0x1, {0x0, 0x1369584f}}, {0x591c}]}}}, {{0x254, 0x1, {{0x1, 0x1000}, 0x3, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "33e23eff31ef899e9d29bf16d5ab9134c9c9d990796872b4474658635c5b3818", "65525878d3fb8b46bd0a6afa8d078ca33629efd3e849e5ff1ce75dcc49635fa5", [{0x0, 0x101}, {}, {0x0, 0x7, {0x0, 0x5}}, {}, {}, {0x0, 0x5}, {}, {0x0, 0x1000}, {0x0, 0x0, {0x0, 0xc424}}, {0x0, 0x0, {0x1}}, {0x8}, {0x0, 0x0, {0x2, 0x20e}}, {}, {}, {}, {0x0, 0x0, {0x0, 0x7ff}}, {0x0, 0x0, {0x0, 0x52}}, {0x2}, {}, {}, {0x0, 0x0, {0x0, 0x4}}, {}, {0x6}, {}, {0x5, 0x1}, {0x0, 0x4, {0x0, 0xf639}}, {}, {}, {}, {}, {0x0, 0x6}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {0x4352}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2da0d6489e8f5b58361eaeb4363a2e6db00cf33cb1652c8615ca128da004e6c8", "377205d6a9cd6e14ca4e045f42b4453b67bf7394bd228f5ee4f6c9406807d991", [{}, {}, {}, {0x101, 0x3}, {}, {}, {}, {0x4, 0x7}, {0x0, 0x1}, {0x0, 0x0, {0x0, 0x1}}, {}, {}, {}, {0x1}, {0x20, 0x7}, {0x0, 0x2}, {0x5}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {0x0, 0x1}, {}, {0x202}, {}, {}, {0x0, 0x3000}, {}, {0x200, 0x13d7}, {0x0, 0x6, {0x0, 0x1000}}, {}, {0x0, 0x0, {0x0, 0x101}}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {0x0, 0x0, {0x2}}]}}}]}, 0xe0c}}, 0x0) 20:37:49 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000380)='asymmetric\x00', 0x0, 0x0) 20:37:49 executing program 1: syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) 20:37:49 executing program 3: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 20:37:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 20:37:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x3, &(0x7f0000001300)=@raw=[@initr0, @generic], &(0x7f0000001380)='syzkaller\x00', 0xffff0000, 0xc4, &(0x7f00000013c0)=""/196, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:49 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)=ANY=[], 0xa0}], 0x1}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$getenv(0x4205, r0, 0x403, &(0x7f0000000040)) 20:37:49 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0x0) 20:37:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={&(0x7f0000001dc0)={0x14, 0x1, 0x5, 0x401}, 0x14}}, 0x0) 20:37:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 20:37:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x2, &(0x7f0000001300)=@raw=[@initr0], &(0x7f0000001380)='syzkaller\x00', 0xffff0000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:49 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000300)) 20:37:49 executing program 0: syz_open_dev$loop(&(0x7f0000000c40), 0x9, 0x12b003) 20:37:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000200)='keyring\x00') 20:37:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) 20:37:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 20:37:49 executing program 0: syz_clone(0xc1080100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000680)="e9009b4b34f072f53acd870490e2186c658c24e776c8cd6d63ffeef27be3") sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0xf8, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}}, 0x0) 20:37:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x2, &(0x7f0000001300)=@raw=[@initr0], &(0x7f0000001380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:49 executing program 3: syz_clone(0x8104000, &(0x7f0000000000)="34c6fad9fd1cf669c542b080a1552abd6a2bf84ba2de32333ad99e05198bf4c5a5822875013c2cd692a498aa937faac5d48bc1fcbe34e654d222ad6c714afd518cc185a99408115bbc7ae252ab", 0x4d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="7e57e43e0eb0cb8a7b7d9a25d7189a22fcbbc1902c17f8007d758b476fb5f1ff2932f1cb8e4d436adac3a7436f0b964b6ca3708e3329ac0825eadeb7fcb4006207caac4216202a86d99165878ab31976db5ef3805cab2dc0e6ba39e045f02dd0bc7b5203d54c976541f8cb2cb2ce0e7cb65c8fb71fb0a67f1bcd30d9e43a6545e086b7a5c0f394cc8f32ecf594632eb326eded58073da4efdfad2fc4f646ea2a790bd54b0155919b0a42fe016a413f1b10cf1db341ebfd9642388b8f3af0d069115e9c349e14603477f22b8e498fc59d39a2cf299c5aabbcf76db59aa734da3f8025c681da8041") syz_clone(0x800000, &(0x7f0000000200)="3859762069beadfa9c3977ef6472f7f24047e66e9afe9ae6785f1af0c20e2fd0772cfdda7ecd9351e1cf752518ef7eb74f8a5bc27f8e6753a3b261db57c0e1ec543c9e7ba2ea29a3b80062a421d9e2356969bc5533e3a94b6840e08b1941e7235a685390baf1ea691ea967f795835506f42021900703255ef87f83af81563c6185c8", 0x82, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f00000003c0)="7311b42ff84fd6cf671a2637c6464645221e552ee74cc99f8ac3befaa816c087a8a0623975369354a0018f7612ad255bc8ae6ddbb9daa5258743912b94d61fbada8d658973285a4d78b05e0c8f72cc157c219e98282745757d6488d566f50e58007d502af75029d2f53ee2a84dcf9d04878925e5e0122a87b47e30962b8667185710ca2e7e67326db96487537c1157") syz_clone(0x23900, &(0x7f00000004c0)="4c498fa8d4608a011024acd8a84ca272fed0a68dfea7a3850babdd8ca030c673781987dfae60447140597aae15fda9b486804b91386775b18d5e58f7beb547d1826d64fbe1c7cda2678a1afaeefaadf0b8f11d9899fb93e6f403d7326ee5d27add6770cbfbafbab572ffe2166522b17a05c2ed478f5b9b19ba", 0x79, &(0x7f0000000380), &(0x7f0000000540), &(0x7f0000000580)="e27ae7f9bcc10aa638076ca9b3a13da021e2b487c639f65a96625862bf92583715b2506660e10b538a8ebd8b7328a451762e6e32b248df2a7fefed9613fc6f49b7f34f252ea092cb23e64b5369a3c44e4e4a6c7264af9a4855beb95802d7cbc323871b25b8c68dc5af7ef4ad9f6a54c4ac4c87e69581973bef0e2db2") sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x38, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0xeb9, 0x51}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x8010) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006c00)="cf") 20:37:49 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/meminfo\x00', 0x0, 0x0) 20:37:49 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000840)='cpuset.mems\x00', 0x2, 0x0) 20:37:50 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/asound/seq/clients\x00', 0x0, 0x0) 20:37:50 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 20:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 20:37:50 executing program 0: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x4240}, 0x18) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x4030582a, 0x0) 20:37:50 executing program 1: syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0xa05c0) [ 301.065695][ T39] audit: type=1800 audit(1674851870.234:57): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=1165 res=0 errno=0 [ 302.640728][ T7796] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 302.652750][ T7770] syz-executor.3 (7770) used greatest stack depth: 21608 bytes left 20:37:51 executing program 1: sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) clock_gettime(0x7, &(0x7f0000000e80)) 20:37:51 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) 20:37:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x5c, 0x0, 0x9, 0x201, 0x0, 0x0, {}, [@NFCTH_QUEUE_NUM={0x8}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x5c}}, 0x0) 20:37:51 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(0x0) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:51 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 20:37:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={&(0x7f0000001dc0)={0xe0c, 0x1, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "093cbe2418ce34878dc8e5b68c7690072879eacece0c881d10037c2a236479bf", "de9d9025f803795124c7990e91782102fff82c17cacdf3ec154b061bcd99ef9d", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x200, {0x1}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5, {0x2}}]}}}, {{0x254, 0x1, {{0x0, 0x6fad09b4}, 0x81, 0x3, 0x0, 0x0, 0x0, 'syz0\x00', "c2208207b31a4b794c5afd05afec378ffac0ed21ffec1004ffb10a2a411c3aff", "8db446f27c474b26aaba29e5c11ceeeed62cb97ab5e15638b4ff5082dfcb3655", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x80, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x5, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "b23f77ad12a8680adecf87da13c55ba58162994178f82624c283c631d4d43ad4", "ed6fcb817d30cbe875f4002aba1ad27de47b8366ba6117221165ca9b175e211e", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x2, 0x3}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "3278e9a5bf0e1914d9f436973191ff401f77263fd2ed32b967243d474298ba27", "c493c66eba86a9b9d29c2f54d05e94f995735cc84cebf3bd5da942aa00ad7618", [{}, {0x0, 0x0, {0x3, 0x3554}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {0x0, 0x5c7, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "33e23eff31ef899e9d29bf16d5ab9134c9c9d990796872b4474658635c5b3818", "65525878d3fb8b46bd0a6afa8d078ca33629efd3e849e5ff1ce75dcc49635fa5", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1000}, {0x0, 0x0, {0x0, 0x10000}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x5}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2da0d6489e8f5b58361eaeb4363a2e6db00cf33cb1652c8615ca128da004e6c8", "377205d6a9cd6e14ca4e045f42b4453b67bf7394bd228f5ee4f6c9406807d991", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xc7, {0x1}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0xba}]}}}]}, 0xe0c}}, 0x0) [ 302.694682][ T7796] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 20:37:51 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000380)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = syz_clone(0xc1080100, &(0x7f00000003c0)="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", 0xfd, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="9b4f462db5a0092afcf48412a84b80bd9a5d1dae47d2") ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wg0\x00'}) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/mnt\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0), 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x140, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x140}, 0x1, 0x0, 0x0, 0x20004000}, 0x81) io_uring_register$IORING_REGISTER_RING_FDS(0xffffffffffffffff, 0x14, &(0x7f00000002c0)=[{0x3, 0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/254, 0xfe}, {&(0x7f0000000100)=""/191, 0xbf}, {&(0x7f0000000300)=""/77, 0x4d}], &(0x7f0000000280)=[0x0, 0x9, 0x1, 0x9]}], 0x1) 20:37:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x20000840) 20:37:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={&(0x7f0000000900), 0xc, 0x0}, 0x0) 20:37:52 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000ac0)) 20:37:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0xe, 0x2, &(0x7f0000000b80)=@raw=[@map_idx_val], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x80, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}, @CTA_SYNPROXY_TSOFF={0x8}, @CTA_SYNPROXY_ITS={0x8}]}]}, 0x80}}, 0x0) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 0: sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) 20:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000014c0)={'vxcan0\x00'}) 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000001040)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 20:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)={[{@test_dummy_encryption}]}, 0x5, 0x5a2, &(0x7f00000005c0)="$eJzs3ctvG0UYAPBvnEebBEioEFAOKBJCrQRNmrRF5XFo71VVHjcuhCatSt2HmiBI4ZBK5YKEuHCoxIkD5b+ACq6cuHHgwglVqhDqCSFqtM7adRM7cdK4G7K/n7TxzM7aM2vn86xnZ+0ASms8+1OJ2BsRl1PEaEtZf+SF48vb3f3r09PZkqJWe/vPFClf19g+5bcj+Z3/HY345ccUe/pW1zu/ePX8TLU6dyXPTy5cuDw5v3j1wLkLM2fnzs5dnH5l+uiRw0eOTh18qP1rrfrE9Q8+Gv385Lvffv1Pmvrut5MpjsW9fIPW/dgq4zHefE5aZc/r0a2urCB9zf+T+9LKFWxbjddvICKeidHoa3k1R+OzNwttHNBTtRRRA0oqiX8oqcZxQOOzfXefgys9PioBHoU7x5cHAFbHf//y2GDsro8NDN9ND4zzpIh4uJG5ZVkdP/908nq2RI/G4YD2lq7tylMr4z/VY3Msdtdzw3crD8R/dgRwKr/N1r+1yfrHV+TFPzw6S9ci4tl2/f/68f9eS/y/v8n6xT8AAAAAAABsnVvHI+Llduf/Ks35P4Nt5v+MRMSxLah//fN/ldtbUA3Qxp3jEW+0nf/bnOM71pfnHq/PBxhIZ85V5w5GxBMRsT8GdmX5qTXqOPDFnhudylrn/2VLVn9jLmDejtv9ux68z+zMwszD7DOw7M61iOfazv9Nzf4/ten/s/eDy13WsefFm6c6la0f/0Cv1L6J2Ne2/7//zRVp7e/nmKwfD0w2jgpWe/6TL7/vVL/4h+Jk/f/w2vE/llq/r2d+Y48/GBGHFvtrnco3e/w/mN7pazx+5uOZhYUrUxGD6cTq9dMbazPsVI14aMRLFv/7X1h7/K95/N8Sh0MRsdRlnU/fG/m9U5n+H4qTxf/shvr/jSemb4790Kn+7vr/w/U+fX++xvgfrK3bAC26nQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwf1SJiMciVSaa6UplYiJiJCKeiuFK9dL8wktnLn14cTYrq//+f6XxS7+jy/nU+P3/sZb89Ir8oYh4MiK+6huq5ydOX6rOFr3zAAAAAAAAAAAAAAAAAAAAsE2MdLj+P/NHX9GtA3quP78V71A+/UU3ACiM+IfyEv9QXuIfykv8Q3ltMv6dLoAdQP8PZTXQ3Wa7e90OoAj6fwAAAAAA2FFuvf7qjRQRS68N1ZfMYF7WPDE4VFTrgF6qFN0AoDDm8EJ5mfoD5dXl5F9gB0vN1N+1duWdZ/+n3jQIAAAAAAAAAAAAAFhl395bv657/T+wI7n+H8rL9f9QXq7/h/LyGR9Y7yp+1/8DAAAAAAAAAAAAQPHmF6+en6lW565ISGy3xEBEbINmFJAYLD48C35jAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv4LAAD///nFIUQ=") 20:37:52 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000380)) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = syz_clone(0xc1080100, &(0x7f00000003c0)="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", 0xfd, &(0x7f0000000200), &(0x7f00000004c0), &(0x7f0000000500)="9b4f462db5a0092afcf48412a84b80bd9a5d1dae47d2") ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wg0\x00'}) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/mnt\x00') r3 = syz_clone(0x0, &(0x7f0000000580)="010a3d55ab9b9f8c5647f95706dc931ac8309f863b5205797929ecbb80b704f74fb6a3955bc4ecc9a084619107305b0f632c1ece9af9710351742b4487744da8acea1d38", 0x44, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="e9009b4b34f072f53acd870490e2186c658c24e776c8cd6d63ffeef27be3") sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x140, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x140}, 0x1, 0x0, 0x0, 0x20004000}, 0x81) io_uring_register$IORING_REGISTER_RING_FDS(0xffffffffffffffff, 0x14, &(0x7f00000002c0)=[{0x3, 0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/254, 0xfe}, {&(0x7f0000000100)=""/191, 0xbf}, {&(0x7f0000000300)=""/77, 0x4d}], &(0x7f0000000280)=[0x8, 0x9, 0x1, 0x9]}], 0x1) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 303.578083][ T7852] loop0: detected capacity change from 0 to 1024 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:52 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:53 executing program 2: clock_gettime(0x7, &(0x7f0000000e80)) [ 304.315514][ T7852] EXT4-fs (loop0): Test dummy encryption mode enabled 20:37:53 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 304.387714][ T7852] EXT4-fs (loop0): barriers disabled [ 304.427000][ T7852] JBD2: no valid journal superblock found [ 304.444916][ T7852] EXT4-fs (loop0): error loading journal 20:37:54 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:54 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80100, 0x0) 20:37:54 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:54 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)={[{@test_dummy_encryption}]}, 0x5, 0x5a2, &(0x7f00000005c0)="$eJzs3ctvG0UYAPBvnEebBEioEFAOKBJCrQRNmrRF5XFo71VVHjcuhCatSt2HmiBI4ZBK5YKEuHCoxIkD5b+ACq6cuHHgwglVqhDqCSFqtM7adRM7cdK4G7K/n7TxzM7aM2vn86xnZ+0ASms8+1OJ2BsRl1PEaEtZf+SF48vb3f3r09PZkqJWe/vPFClf19g+5bcj+Z3/HY345ccUe/pW1zu/ePX8TLU6dyXPTy5cuDw5v3j1wLkLM2fnzs5dnH5l+uiRw0eOTh18qP1rrfrE9Q8+Gv385Lvffv1Pmvrut5MpjsW9fIPW/dgq4zHefE5aZc/r0a2urCB9zf+T+9LKFWxbjddvICKeidHoa3k1R+OzNwttHNBTtRRRA0oqiX8oqcZxQOOzfXefgys9PioBHoU7x5cHAFbHf//y2GDsro8NDN9ND4zzpIh4uJG5ZVkdP/908nq2RI/G4YD2lq7tylMr4z/VY3Msdtdzw3crD8R/dgRwKr/N1r+1yfrHV+TFPzw6S9ci4tl2/f/68f9eS/y/v8n6xT8AAAAAAABsnVvHI+Llduf/Ks35P4Nt5v+MRMSxLah//fN/ldtbUA3Qxp3jEW+0nf/bnOM71pfnHq/PBxhIZ85V5w5GxBMRsT8GdmX5qTXqOPDFnhudylrn/2VLVn9jLmDejtv9ux68z+zMwszD7DOw7M61iOfazv9Nzf4/ten/s/eDy13WsefFm6c6la0f/0Cv1L6J2Ne2/7//zRVp7e/nmKwfD0w2jgpWe/6TL7/vVL/4h+Jk/f/w2vE/llq/r2d+Y48/GBGHFvtrnco3e/w/mN7pazx+5uOZhYUrUxGD6cTq9dMbazPsVI14aMRLFv/7X1h7/K95/N8Sh0MRsdRlnU/fG/m9U5n+H4qTxf/shvr/jSemb4790Kn+7vr/w/U+fX++xvgfrK3bAC26nQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwf1SJiMciVSaa6UplYiJiJCKeiuFK9dL8wktnLn14cTYrq//+f6XxS7+jy/nU+P3/sZb89Ir8oYh4MiK+6huq5ydOX6rOFr3zAAAAAAAAAAAAAAAAAAAAsE2MdLj+P/NHX9GtA3quP78V71A+/UU3ACiM+IfyEv9QXuIfykv8Q3ltMv6dLoAdQP8PZTXQ3Wa7e90OoAj6fwAAAAAA2FFuvf7qjRQRS68N1ZfMYF7WPDE4VFTrgF6qFN0AoDDm8EJ5mfoD5dXl5F9gB0vN1N+1duWdZ/+n3jQIAAAAAAAAAAAAAFhl395bv657/T+wI7n+H8rL9f9QXq7/h/LyGR9Y7yp+1/8DAAAAAAAAAAAAQPHmF6+en6lW565ISGy3xEBEbINmFJAYLD48C35jAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv4LAAD///nFIUQ=") 20:37:54 executing program 2: syz_clone(0xc1080100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x0) [ 304.972591][ T7890] loop0: detected capacity change from 0 to 1024 [ 305.006003][ T7890] EXT4-fs (loop0): Test dummy encryption mode enabled [ 305.041922][ T7890] EXT4-fs (loop0): barriers disabled [ 305.077025][ T7890] JBD2: no valid journal superblock found [ 305.082317][ T7890] EXT4-fs (loop0): error loading journal 20:37:54 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080), 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @adiantum, 0x0, @desc3}) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000300)={0x0, "0f5b676b2de6cbc6ea46abc39d0a4fc4b27659a74f7a769bff4c95bd6039eb6742f2f13e0c86048c0ea164d2a123cde57f11d04354869533f185505f85c8725b", 0x2c}, 0x48, r2) getdents64(r0, &(0x7f00000003c0)=""/93, 0x5d) 20:37:54 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:54 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)={[{@test_dummy_encryption}]}, 0x5, 0x5a2, &(0x7f00000005c0)="$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") [ 306.296478][ T7899] syz-executor.2 (pid 7899) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 306.320315][ T7898] loop0: detected capacity change from 0 to 1024 [ 306.328640][ T6541] blk_print_req_error: 3 callbacks suppressed [ 306.328728][ T6541] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 306.374256][ T7898] EXT4-fs (loop0): Test dummy encryption mode enabled [ 306.384952][ T7898] EXT4-fs (loop0): barriers disabled [ 306.405652][ T7898] JBD2: no valid journal superblock found 20:37:55 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:55 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 306.423149][ T7898] EXT4-fs (loop0): error loading journal 20:37:55 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:55 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:55 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)={[{@test_dummy_encryption}]}, 0x5, 0x5a2, &(0x7f00000005c0)="$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") [ 306.619453][ T7916] loop0: detected capacity change from 0 to 1024 [ 306.622567][ T6541] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 306.632647][ T7916] EXT4-fs (loop0): Test dummy encryption mode enabled [ 306.658536][ T7916] EXT4-fs (loop0): barriers disabled [ 306.669048][ T7916] JBD2: no valid journal superblock found [ 306.710099][ T7916] EXT4-fs (loop0): error loading journal 20:37:55 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 307.078495][ T7899] fscrypt: Adiantum using implementation "adiantum(xchacha12-simd,aes-aesni,nhpoly1305-avx2)" 20:37:57 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x600000, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, 0x0, 0x0) 20:37:57 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:57 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000380)) setns(r0, 0x0) 20:37:57 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:57 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 20:37:57 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000840)='cpuset.mems\x00', 0x2, 0x0) 20:37:57 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$loop(0x0, 0x0, 0x0) 20:37:57 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:57 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0x3, &(0x7f0000001940)=@framed, &(0x7f0000001a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x80) 20:37:57 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000680), 0x10001, 0x0) 20:37:57 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x3, &(0x7f0000001300)=@raw=[@initr0, @generic], &(0x7f0000001380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0x3, &(0x7f0000001940)=@framed, &(0x7f0000001a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 20:37:58 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/sysvipc/sem\x00', 0x0, 0x0) 20:37:58 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) 20:37:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x1, &(0x7f0000001300)=@raw=[@generic], &(0x7f0000001380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:58 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 20:37:58 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x5, &(0x7f0000001940)=@framed={{}, [@cb_func]}, &(0x7f0000001a00)='syzkaller\x00', 0x4, 0xbc, &(0x7f0000001a40)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:58 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 2: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 20:37:58 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f80)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 20:37:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0) 20:37:58 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x30, 0x0, 0x9, 0x201, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x30}}, 0x0) 20:37:58 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:58 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 309.902342][ T8006] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 20:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={&(0x7f0000000900), 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x20000840) 20:37:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xffffe66d}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xd22}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffffff9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2aaf003e}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6cec2533}]}, 0x54}, 0x1, 0x0, 0x0, 0x4001}, 0x20000840) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x600000, 0x0) 20:37:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0x3, &(0x7f0000001940)=@framed, &(0x7f0000001a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000d40), 0xffffffffffffffff) 20:37:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)={&(0x7f0000001dc0)={0x14}, 0x14}}, 0x0) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x2, &(0x7f0000001300)=@raw=[@initr0], &(0x7f0000001380)='syzkaller\x00', 0x0, 0xc4, &(0x7f00000013c0)=""/196, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: syz_open_dev$loop(&(0x7f0000000c40), 0x0, 0x12b003) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/sysvipc/sem\x00', 0x0, 0x0) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xa}, 0x48) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000840), 0x2, 0x0) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000a40)={&(0x7f0000000900), 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/asound/seq/clients\x00', 0x0, 0x0) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: syz_open_dev$loop(&(0x7f0000000ec0), 0x0, 0x400200) 20:37:59 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:37:59 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000740), 0x505103, 0x0) 20:38:00 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 0: msgrcv(0x0, 0x0, 0x0, 0xd633e86ba6c887e2, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 0: r0 = syz_clone(0xc1080100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x11c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x81) 20:38:00 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 0: r0 = syz_clone(0xc1080100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x11c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x81) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 311.697606][ T8119] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:00 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 311.784371][ T8127] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 0: r0 = syz_clone(0xc1080100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="e9009b4b34f072f53acd870490e2186c658c24e776c8cd6d63ffeef27be3") sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x118, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x118}, 0x1, 0x0, 0x0, 0x20004000}, 0x81) 20:38:01 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:01 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 312.330814][ T8141] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:01 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:01 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, r0) 20:38:01 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:01 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 312.514311][ T8160] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x5}, 0x48) [ 313.042375][ T8165] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x48) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 313.130158][ T8176] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000001040)={&(0x7f0000000f40), 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000001880)={'wg2\x00'}) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x200000) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x5) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'ip_vti0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000740), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) 20:38:02 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x300) 20:38:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 20:38:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:02 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000002b40)=0x17, 0x4) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:03 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:03 executing program 1: pselect6(0x40, &(0x7f0000002e40), 0x0, &(0x7f0000002ec0)={0x5}, &(0x7f0000002f00)={0x77359400}, 0x0) 20:38:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x5) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000740), 0xffffffffffffffff) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:03 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r0, 0x1}, 0x14}}, 0x0) 20:38:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), r0) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:03 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x900) 20:38:03 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x500) 20:38:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000740), r0) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:03 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) 20:38:03 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x3) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 20:38:03 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x2) 20:38:03 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000040)) socketpair(0x10, 0x80000, 0x0, &(0x7f0000000880)) 20:38:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, 0x0) 20:38:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x5) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xeb}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f00000003c0)={'gretap0\x00', 0x0, 0x40, 0x0, 0xfffffe9d, 0x4, {{0xa, 0x4, 0x1, 0x0, 0x28, 0x0, 0x0, 0x3, 0x96115aa02557d658, 0x0, @broadcast, @empty, {[@end, @lsrr={0x83, 0xf, 0x23, [@broadcast, @local, @broadcast]}, @noop]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x49c1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xffffffe1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) read$ptp(r1, &(0x7f0000000840)=""/49, 0x31) syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), 0xffffffffffffffff) socket$inet6(0xa, 0x6, 0x3) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000e40)={0x0, 0x5, 0x7}, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000ec0), 0xffffffffffffffff) 20:38:03 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r0, 0x1}, 0x14}}, 0x0) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 1: io_setup(0xffffffff, &(0x7f0000003600)) [ 314.860782][ T8287] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:04 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x10000) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, 0x0, 0x0) 20:38:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000002d80)={&(0x7f0000002c80), 0xc, 0x0}, 0x0) [ 314.920713][ T8292] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) 20:38:04 executing program 3: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000018c0)={0x0, 0x0, "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", "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"}) socketpair(0x0, 0x0, 0xf93, &(0x7f00000039c0)) socketpair(0x0, 0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000004e00)='./binderfs2/binder0\x00', 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) 20:38:04 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x200000) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 315.041240][ T8303] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:04 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000001140)=0x9, 0x4) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 0: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x0, 0x0) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x44) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f00000003c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0xfffffe9d, 0x4, {{0x6, 0x4, 0x0, 0x7, 0x18, 0x64, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty, {[@end]}}}}}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) socket$inet6(0xa, 0x0, 0x3) 20:38:04 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x14, r0, 0x1}, 0x14}}, 0x0) 20:38:04 executing program 0: socket(0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000004e00)='./binderfs2/binder0\x00', 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000005040), 0xffffffffffffffff) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x0, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000005400)={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, {0xa, 0x0, 0x0, @dev}}, 0x5c) 20:38:04 executing program 1: io_setup(0x0, &(0x7f0000003600)) 20:38:04 executing program 3: syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000740), 0xffffffffffffffff) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00'}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 20:38:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000002b40)=0x17, 0x4) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) 20:38:04 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), 0xffffffffffffffff) 20:38:04 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, 0x0, 0x0) 20:38:04 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x2]}, 0x8}) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 0: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) 20:38:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) read$ptp(r0, &(0x7f0000000840)=""/49, 0x31) 20:38:04 executing program 1: openat$binderfs(0xffffffffffffff9c, &(0x7f0000004e00)='./binderfs2/binder0\x00', 0x0, 0x0) 20:38:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x0, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 1: clock_gettime(0x0, &(0x7f0000001a00)) 20:38:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:04 executing program 0: syz_open_dev$sg(&(0x7f0000000180), 0x2, 0x8602) 20:38:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000e40), 0x10) 20:38:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 20:38:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 20:38:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:05 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x800, 0x0) 20:38:05 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000002e00), 0x10) 20:38:05 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x5) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) socket$nl_route(0x10, 0x3, 0x0) 20:38:05 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) 20:38:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:05 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0}) io_setup(0xffffffff, &(0x7f0000003600)) 20:38:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) read$ptp(r0, 0x0, 0x0) 20:38:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:05 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) 20:38:05 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0xeb, &(0x7f0000000000)=""/235}, &(0x7f00000001c0)="a11d7581318d0dd78fbfd284e76af94854", &(0x7f0000000280)=""/157, 0x0, 0x0, 0x0, 0x0}) 20:38:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x24051) 20:38:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 20:38:06 executing program 0: request_key(&(0x7f0000003540)='syzkaller\x00', 0x0, 0x0, 0x0) 20:38:06 executing program 2: io_setup(0x7fffffff, &(0x7f0000000240)) 20:38:06 executing program 1: syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), 0xffffffffffffffff) 20:38:06 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0}) clock_gettime(0x0, &(0x7f0000001a00)) 20:38:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x21, 0x2, @buffer={0x0, 0xeb, &(0x7f0000000000)=""/235}, &(0x7f00000001c0)="a11d7581318d0dd78fbfd284e76af94854bb09c7b8cf950055583721f2b87c6ce1", &(0x7f0000000280)=""/157, 0x7, 0x0, 0x0, 0x0}) 20:38:06 executing program 3: setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, 0x0, 0x0) 20:38:06 executing program 1: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) 20:38:06 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:06 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:06 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 317.448949][ T8433] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:06 executing program 3: syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f00000008c0), 0xffffffffffffffff) 20:38:07 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400)={0xffffffffffffffff}) 20:38:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'team_slave_0\x00', &(0x7f0000000140)=@ethtool_stats}) 20:38:07 executing program 0: mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x100) 20:38:07 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000004c80), 0x2, 0x0) 20:38:07 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0xc0, 0x0) 20:38:07 executing program 3: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x514601) 20:38:07 executing program 1: request_key(&(0x7f0000003540)='syzkaller\x00', &(0x7f0000003580)={'syz', 0x0}, &(0x7f00000035c0)='$\\\' %#]}\x1d}', 0x0) 20:38:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000002c0), r0) 20:38:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 20:38:07 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0c00000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:38:07 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000001380)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 20:38:07 executing program 3: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000780)='maps\x00') read$watch_queue(r0, &(0x7f0000000000)=""/51, 0x33) 20:38:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {0x1, 0x0, {0x0, 0x1}}, {}, {0x0, 0x0, {0x2}}, {0xfcbe, 0x1f, {0x1}}, {}, {0x0, 0x8}, {0x0, 0x0, {0x3}}, {0x4}, {0x0, 0x0, {0x0, 0xb64d}}, {}, {}, {}, {0x0, 0x0, {0x0, 0x9}}, {}, {0x0, 0x0, {0x2}}, {0x9}, {0x1, 0x3}, {0x0, 0x4, {0x2}}, {0x9, 0x0, {0x1}}, {0x0, 0x0, {0x0, 0x6}}, {}, {0x0, 0x1}, {}, {0xca1d}, {}, {0x100}, {0x0, 0x7, {0x3}}, {}, {0x0, 0x0, {0x1, 0x10000}}, {}, {0x0, 0xe7de}, {0x80, 0x7}, {0x0, 0x0, {0x0, 0x619}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{}, {0x0, 0x6f3f}, {}, {}, {0xc17}, {}, {}, {0x11, 0x2f}, {}, {}, {0x7, 0x0, {0x2, 0x8}}, {0x200}, {0x0, 0x0, {0x0, 0xcf}}, {}, {}, {}, {0x0, 0x40}, {}, {}, {}, {0x0, 0x9, {0x2, 0xea96}}, {0x0, 0x401}, {}, {0x0, 0x7f}, {0x2, 0x8, {0x2, 0x5}}, {0x0, 0x1, {0x0, 0xa2}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7ff}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x2}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{}, {0xdf3d}, {}, {0x4}, {}, {0x7ff, 0x7}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x0, {0x1, 0x3}}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x3}}, {}, {0x7}]}}}, {{0x254, 0x1, {{0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{0x0, 0xe0}, {}, {0x0, 0x0, {0x0, 0xfffffc00}}, {}, {}, {}, {}, {0x6}, {}, {}, {0x5, 0x4}, {0x892d}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x800}, {0x0, 0x3}, {}, {0x4}, {}, {}, {0x0, 0x0, {0x2, 0x7}}, {0x0, 0x0, {0x0, 0x1}}, {}, {}, {0x0, 0x0, {0x0, 0xfff}}, {}, {}, {}, {}, {}, {}, {}, {0x5, 0x2}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{}, {}, {}, {}, {}, {}, {0x0, 0x40}, {0xc0}, {0x100}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xff80}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1, {0x0, 0x3}}, {0x0, 0x5, {0x0, 0x4}}, {0x0, 0x0, {0x3}}, {}, {}, {}, {}, {}, {0x0, 0x7f}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {}, {}, {}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4d}, {0x0, 0x0, {0x3}}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x601f}}, {}, {}, {0x0, 0x0, {0x0, 0xfffffff8}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) 20:38:07 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/llc/socket\x00') 20:38:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={0x0}}, 0x0) 20:38:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) 20:38:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_NEWSET={0x14}], {0x14}}, 0x3c}}, 0x0) 20:38:08 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb"}}}]}, 0x1060}}, 0x0) 20:38:08 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001640)=[{&(0x7f0000001580)=""/175, 0xaf}], 0x1, &(0x7f0000001880)=[{&(0x7f0000001680)=""/201, 0xc9}], 0x1, 0x0) syz_clone3(&(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:38:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 20:38:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x7434, 0x0) 20:38:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:08 executing program 2: request_key(&(0x7f0000003540)='syzkaller\x00', &(0x7f0000003580)={'syz', 0x0}, 0x0, 0x0) 20:38:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCGFLAGS1(r0, 0x7434, 0x0) 20:38:08 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:08 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:08 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:08 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 319.473863][ T8519] loop3: detected capacity change from 0 to 128 [ 319.487806][ T8519] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 319.531203][ T8519] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:08 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5bd4ced6edccb3b26834508cabb26bec9b6e6949ec203f52ac85e4ef2559d851a88a3fa56ba9f90a7a7476937417d4681ccd1ac7d80554b3e464e1ee763a9c8"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) 20:38:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWTABLE={0x24, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4}]}], {0x14}}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) 20:38:08 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, 0x0) 20:38:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x801}], {0x14}}, 0x3c}}, 0x0) 20:38:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) read$FUSE(r0, 0x0, 0x0) 20:38:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x301}], {0x14}}, 0x3c}}, 0x0) 20:38:08 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 20:38:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @multicast1}}) 20:38:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x301}], {0x14}}, 0x3c}}, 0x0) 20:38:08 executing program 3: r0 = socket(0x2, 0x801, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:38:08 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5451, 0x0) 20:38:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 20:38:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {}, {}, {}, {}, {}, {}, {0xc3bd}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {}, {0x40, 0x0, {0x0, 0x3}}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {}, {}, {0x0, 0x100, {0x0, 0x7dc}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x25, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x200}, {}, {}, {}, {}, {}, {}, {0x401, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x101}}, {}, {0xa5}, {}, {}, {0x6}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {0x0, 0x233}, {}, {}, {0x0, 0x0, {0x0, 0xfffffbff}}, {0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3f}, {}, {}, {}, {}, {}, {0x0, 0x8}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x600}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {}, {}, {}, {0x7, 0x0, {0x0, 0xfb8}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x3ff}}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {0x7}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{0x0, 0x5}, {}, {}, {}, {0x400}, {}, {}, {0xc0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0xfff}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {}, {0x5}, {0x0, 0x7}, {}, {}, {}, {0x4}, {0x40}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {}, {}, {0x0, 0x0, {0x2}}]}}}]}, 0x1060}}, 0x0) 20:38:08 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000340), 0x52180, 0x0) 20:38:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14, 0xe, 0x2, 0x301}, 0x14}}, 0x0) 20:38:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x14, 0x0, 0x5, 0x801}, 0x14}}, 0x0) 20:38:09 executing program 2: nanosleep(&(0x7f00000001c0), 0x0) 20:38:09 executing program 0: r0 = getpid() get_robust_list(r0, &(0x7f0000000580)=0x0, &(0x7f00000001c0)) 20:38:09 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x3a3001, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 20:38:09 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40049409, 0x0) 20:38:09 executing program 0: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {0x0, 0x0, {0x2}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {0x9cd}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {0xc7}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x9}}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{}, {}, {}, {0x0, 0xabb9}, {0x0, 0x0, {0x0, 0x7}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}, {}, {0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0xffffffff}}, {}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x6}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x9}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7}, {}, {0x0, 0x0, {0x0, 0x3}}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0xfff}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{}, {}, {}, {}, {0x0, 0x0, {0x0, 0xffff0d9c}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}}]}, 0x1060}}, 0x0) 20:38:09 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@multicast2, @private}, 0xc) [ 320.009439][ T8571] loop3: detected capacity change from 0 to 128 20:38:09 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 320.021028][ T8571] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 320.034686][ T8571] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 20:38:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x4}]}, 0x20}}, 0x0) 20:38:09 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r0, 0x0, 0x0, 0x11002, 0x0, 0x0) 20:38:09 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{0x3, 0x9}, 0x0, 0x0, 0x6, 0x6, 0x18, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {}, {0x0, 0x0, {0x1}}, {}, {0x8}, {}, {0x0, 0x800}, {}, {}, {0x30f7}, {}, {0x4}, {}, {0x5, 0xe4}, {0x0, 0x9}, {}, {}, {}, {0x401}, {}, {0x9, 0x0, {0x0, 0x80000001}}, {}, {0x0, 0x4}, {0x0, 0x3, {0x0, 0x3}}, {}, {0x0, 0x0, {0x0, 0x4}}, {0x6}, {0x0, 0x0, {0x0, 0x1}}, {0x0, 0x5, {0x3}}, {0x40, 0x4, {0x0, 0x3}}, {}, {0x0, 0x7, {0x0, 0x20}}, {0x9, 0x0, {0x2}}, {0x0, 0x1ff, {0x1}}, {}, {}, {0x0, 0x0, {0x3}}, {}, {}, {0x0, 0x100, {0x2}}]}}}, {{0x254, 0x1, {{0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{0xc000, 0x0, {0x2}}, {0x0, 0x0, {0x3}}, {0x0, 0x0, {0x2}}, {0x5}, {}, {0x0, 0x0, {0x3, 0x175c}}, {0x0, 0x0, {0x0, 0x3}}, {}, {0x0, 0x0, {0x0, 0x6}}, {0xffff, 0x0, {0x3}}, {0x0, 0x0, {0x2}}, {0x0, 0x969}, {0x0, 0x0, {0x0, 0xcf}}, {}, {0x0, 0x1}, {0x0, 0x0, {0x1}}, {0xab7, 0x0, {0x0, 0xc5}}, {}, {0x0, 0x0, {0x2}}, {}, {}, {0x0, 0x0, {0x1}}, {0x2}, {}, {0x2}, {0x5}, {0x0, 0x0, {0x0, 0xf1}}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {0x0, 0x9, {0x3}}, {0x0, 0x4, {0x1, 0x7ff}}, {0x0, 0xfff, {0x0, 0x1}}, {0x3}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x81, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {0x7fff, 0x233, {0x0, 0x3}}, {0xff}, {0x6ef}, {}, {0x0, 0x5}, {0x6}, {}, {}, {}, {0x4, 0x0, {0x2}}, {0xa3}, {}, {}, {}, {0x6}, {}, {}, {0x0, 0x2, {0x1}}, {0x3f}, {}, {0x0, 0x5, {0x0, 0x80}}, {0x0, 0x7}, {0x0, 0x0, {0x3}}, {0x0, 0x0, {0x1}}, {0x8, 0x0, {0x0, 0x9}}, {0x0, 0x0, {0x0, 0x20}}, {0x1}, {}, {}, {}, {0x0, 0x0, {0x0, 0x401}}, {}, {0x8001}, {0x0, 0x8, {0x1, 0x4}}, {0x0, 0x0, {0x0, 0xd26}}, {}, {}, {0x0, 0x600, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{0x0, 0xda1, {0x0, 0x200}}, {0xdf3d}, {0x9}, {}, {}, {0x7ff}, {0x0, 0x1, {0x1}}, {0x0, 0x1}, {}, {0x9}, {0x0, 0x100, {0x0, 0x3}}, {}, {0x0, 0x0, {0x3}}, {0x1, 0x0, {0x3}}, {}, {0x0, 0x0, {0x0, 0x5}}, {0x6}, {}, {0x0, 0x0, {0x0, 0x3}}, {0x3, 0x2}, {}, {}, {0x5, 0xffff}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {0x0, 0x0, {0x0, 0x6}}, {0x3}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x3}}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{}, {}, {}, {}, {}, {}, {}, {0x6}, {0x0, 0x0, {0x0, 0x1ff}}, {}, {}, {}, {}, {0x0, 0x40}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {}, {}, {}, {0x0, 0x2}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {0x0, 0x400}, {}, {0x0, 0x7f}, {}, {}, {}, {}, {0x64}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0xfffffff8}}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x0, {0x0, 0x4}}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {0x0, 0x8}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {0x0, 0x0, {0x1}}, {}, {0x0, 0x7}, {}, {}, {}, {0x4}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) 20:38:09 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x240002, 0x0) [ 320.127951][ T8585] loop3: detected capacity change from 0 to 128 20:38:09 executing program 0: get_robust_list(0x0, &(0x7f0000000580)=0x0, &(0x7f00000001c0)) [ 320.151561][ T8585] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000780)='maps\x00') read$watch_queue(r0, 0x0, 0x0) [ 320.177062][ T8585] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000002200)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000021c0)={&(0x7f0000002140)={0x14}, 0x14}}, 0x0) 20:38:09 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 20:38:10 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5411, 0x0) 20:38:10 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x0) 20:38:10 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001300), 0xc, 0x0}, 0x0) [ 320.978573][ T8604] loop3: detected capacity change from 0 to 128 20:38:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x801}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) [ 320.986405][ T8604] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0xfcbe, 0x0, {0x1}}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0xb64d}}, {0x0, 0x9}, {}, {}, {}, {}, {0x0, 0x6}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x4}}, {}, {}, {}, {0x40}, {}, {}, {0x0, 0x0, {0x0, 0x6}}, {0xff81}, {}, {}, {}, {0x0, 0x101, {0x0, 0x619}}, {}, {0x0, 0x0, {0x2}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{0xc000}, {0x0, 0x0, {0x0, 0x2}}, {}, {}, {}, {0x0, 0x0, {0x3}}, {}, {0x0, 0x0, {0x0, 0x20000000}}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {0x0, 0x0, {0x3}}, {}, {}, {}, {}, {0xab7}, {}, {}, {}, {0xff8, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {}, {0x8}, {}, {}, {}, {0x0, 0x0, {0x3}}, {0x9}, {0x0, 0xfff}, {0x0, 0x0, {0x0, 0x7}}]}}}, {{0x254, 0x1, {{0x1}, 0xd0, 0x0, 0x0, 0xefd, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {}, {}, {0x0, 0x0, {0x0, 0x5}}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {}, {0x0, 0x0, {0x0, 0x1}}, {0xa3}, {}, {0x0, 0x0, {0x0, 0x7}}, {}, {0x0, 0x6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x800}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x400, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{}, {}, {0x9, 0x0, {0x3}}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{}, {}, {}, {}, {}, {}, {0x0, 0x22}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x1}}, {}, {}, {}, {0x0, 0xae96}, {}, {}, {}, {}, {0x0, 0x800}, {0x0, 0x0, {0x0, 0x40}}, {}, {}, {}, {}, {}, {0xcf83}, {0x0, 0x400, {0x2, 0xffffffff}}, {0xffff}, {}, {}, {0x6}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{}, {0x0, 0x0, {0x1}}, {}, {}, {}, {}, {0x4dd0, 0x40}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x3}}, {0x64}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}, {}, {}, {0x0, 0xffff}, {}, {0x8}, {}, {0x5}, {}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {}, {}, {0xff}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {}, {}, {}, {0x0, 0xddbb}]}}}]}, 0x1060}}, 0x0) 20:38:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000080)={0x18, 0x0, 0x3, 0x401, 0x0, 0x0, {}, [@generic='1']}, 0x18}}, 0x0) [ 321.000988][ T8604] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 321.028494][ T8611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:38:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 20:38:10 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000005ac0)={0x0, 0x0, &(0x7f0000005a80)={0x0}}, 0x0) 20:38:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14}], {0x14}}, 0x3c}}, 0x0) 20:38:10 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40) 20:38:10 executing program 0: syz_clone3(&(0x7f0000001240)={0x40000000, &(0x7f0000000000), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 321.097367][ T8622] loop3: detected capacity change from 0 to 128 20:38:10 executing program 1: syz_clone3(&(0x7f00000042c0)={0x70080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000004840)={&(0x7f0000004780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000004800)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) [ 321.107337][ T8622] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 321.122725][ T8622] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, 0x0, 0x0) 20:38:10 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 20:38:10 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x2c}}, 0x0) 20:38:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') write$nbd(r0, 0x0, 0x0) [ 321.190866][ T8633] loop3: detected capacity change from 0 to 128 [ 321.201466][ T6541] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 321.212800][ T8633] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:10 executing program 0: syz_clone3(&(0x7f0000001240)={0x40000000, &(0x7f0000000000), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:38:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb"}}}]}, 0x1060}}, 0x0) [ 321.229318][ T8633] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:10 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5450, 0x0) 20:38:10 executing program 3: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 20:38:10 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000480)={0xfffffffffffffffe, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 20:38:10 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 20:38:10 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x101002, 0x0) 20:38:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={&(0x7f0000002140)={0x14}, 0x14}}, 0x0) 20:38:10 executing program 3: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000800)={0x7, 'vcan0\x00'}) 20:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000002200)={&(0x7f0000002100), 0xc, &(0x7f00000021c0)={0x0}}, 0x0) 20:38:10 executing program 3: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x401}, @NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x3}, @NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x301}], {0x14}}, 0x64}}, 0x0) 20:38:10 executing program 0: syz_genetlink_get_family_id$mptcp(&(0x7f0000002740), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000002880)) 20:38:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000840)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x401}, @NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x3}, @NFT_MSG_NEWSET={0x14}], {0x14}}, 0x64}}, 0x0) 20:38:10 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000002200)={&(0x7f0000002100), 0xc, 0x0}, 0x0) 20:38:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x14}, 0x14}}, 0x0) [ 321.437873][ T8677] loop3: detected capacity change from 0 to 128 20:38:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) 20:38:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000005ac0)={0x0, 0x0, 0x0}, 0x0) 20:38:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 321.466904][ T8677] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 321.494355][ T8677] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:11 executing program 0: r0 = getpid() get_robust_list(r0, 0x0, 0x0) 20:38:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002680)={0x0}}, 0x1) 20:38:11 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f00000059c0)={&(0x7f00000048c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000005980)={0x0}}, 0x4840) 20:38:11 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:11 executing program 1: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000004840)={0x0, 0x0, &(0x7f0000004800)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) 20:38:11 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 20:38:11 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, 0x0) [ 322.374301][ T8692] loop3: detected capacity change from 0 to 128 20:38:11 executing program 1: sched_rr_get_interval(0x0, &(0x7f0000000280)) 20:38:11 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) [ 322.433558][ T8692] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 322.475571][ T8692] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:11 executing program 1: syz_clone3(&(0x7f0000001240)={0x40000000, 0x0, 0x0, 0x0, {}, &(0x7f0000000140)=""/228, 0xe4, 0x0, 0x0}, 0x58) 20:38:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001840)={0x14, 0x2, 0x2, 0x201}, 0x14}}, 0x0) 20:38:11 executing program 0: socketpair(0x0, 0x3, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x28, 0x16, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x8, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x4}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {0x1}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x801, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}]}, @NFT_MSG_NEWTABLE={0x38, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_USERDATA={0x4}]}], {0x14}}, 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 20:38:11 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 322.555775][ T8712] loop3: detected capacity change from 0 to 128 20:38:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000780)='maps\x00') read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) [ 322.569417][ T8712] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_CLASS={0x8}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_NAT={0xc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x38}}, 0x0) [ 322.616624][ T8712] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:11 executing program 0: r0 = getpid() process_vm_readv(r0, &(0x7f0000001640)=[{&(0x7f0000001580)=""/165, 0xaf}], 0x1, &(0x7f0000001880)=[{&(0x7f0000001680)=""/201, 0xc9}, {0x0, 0xfffffea6}], 0x2, 0x0) 20:38:11 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(&(0x7f0000001140), 0xffffffffffffffff) 20:38:11 executing program 0: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:11 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:11 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:11 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', 0x0) [ 322.774262][ T8726] loop3: detected capacity change from 0 to 128 [ 322.815596][ T1321] ieee802154 phy0 wpan0: encryption failed: -22 [ 322.820203][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 [ 322.869212][ T8726] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 322.886639][ T8726] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:12 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:12 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:38:12 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 323.034448][ T8737] loop3: detected capacity change from 0 to 128 [ 323.042889][ T8737] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 323.085382][ T8737] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 323.108607][ T8740] loop1: detected capacity change from 0 to 128 [ 323.163609][ T8740] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 323.222674][ T8740] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:12 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:38:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 1) 20:38:12 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 323.275937][ T8744] loop3: detected capacity change from 0 to 128 [ 323.277875][ T8745] FAULT_INJECTION: forcing a failure. [ 323.277875][ T8745] name failslab, interval 1, probability 0, space 0, times 1 [ 323.302279][ T8745] CPU: 2 PID: 8745 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 323.310560][ T8745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 323.321546][ T8745] Call Trace: [ 323.325231][ T8745] [ 323.328421][ T8745] dump_stack_lvl+0xd1/0x138 [ 323.335406][ T8745] should_fail_ex.cold+0x5/0xa [ 323.339157][ T8745] should_failslab+0x9/0x20 [ 323.344326][ T8745] __kmem_cache_alloc_node+0x5b/0x430 [ 323.349400][ T8745] ? tomoyo_realpath_from_path+0xc3/0x600 [ 323.351755][ T8744] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 323.356639][ T8745] ? tomoyo_realpath_from_path+0xc3/0x600 [ 323.356675][ T8745] __kmalloc+0x4a/0xd0 [ 323.356722][ T8745] tomoyo_realpath_from_path+0xc3/0x600 [ 323.356745][ T8745] ? tomoyo_profile+0x46/0x60 [ 323.356762][ T8745] tomoyo_path_number_perm+0x217/0x570 [ 323.356780][ T8745] ? tomoyo_path_number_perm+0x1c1/0x570 [ 323.356799][ T8745] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 323.356835][ T8745] ? wait_for_completion_io_timeout+0x20/0x20 [ 323.356876][ T8745] ? __fget_files+0x26a/0x440 [ 323.356953][ T8745] security_file_ioctl+0x54/0xb0 [ 323.356999][ T8745] __do_compat_sys_ioctl+0x4e/0x2b0 [ 323.357015][ T8745] __do_fast_syscall_32+0x65/0xf0 [ 323.357038][ T8745] do_fast_syscall_32+0x33/0x70 [ 323.357058][ T8745] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 323.357132][ T8745] RIP: 0023:0xf7f32549 [ 323.357170][ T8745] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 323.357184][ T8745] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 323.357273][ T8745] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 323.357284][ T8745] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 323.357292][ T8745] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 323.447844][ T8747] loop1: detected capacity change from 0 to 128 [ 323.448290][ T8744] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 323.452047][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 323.452106][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452145][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452193][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452210][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452247][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452264][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452304][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452321][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452359][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452375][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452413][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 323.452429][ T6541] Buffer I/O error on dev loop1, logical block 0, async page read [ 323.452574][ T6541] I/O error, dev loop1, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 323.452630][ T6541] I/O error, dev loop1, sector 24 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 20:38:12 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) [ 323.452647][ T6541] Buffer I/O error on dev loop1, logical block 3, async page read [ 323.460167][ T8745] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 323.460183][ T8745] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 323.460204][ T8745] [ 323.465545][ T8745] ERROR: Out of memory at tomoyo_realpath_from_path. [ 323.721472][ T8747] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 323.735727][ T8747] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 2) [ 323.826227][ T8751] FAULT_INJECTION: forcing a failure. [ 323.826227][ T8751] name failslab, interval 1, probability 0, space 0, times 0 20:38:13 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") open(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 323.852942][ T8751] CPU: 1 PID: 8751 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 323.859348][ T8751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 323.866158][ T8751] Call Trace: [ 323.868387][ T8751] [ 323.870173][ T8751] dump_stack_lvl+0xd1/0x138 [ 323.873285][ T8751] should_fail_ex.cold+0x5/0xa [ 323.876538][ T8751] should_failslab+0x9/0x20 [ 323.881085][ T8751] __kmem_cache_alloc_node+0x5b/0x430 [ 323.885536][ T8751] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 323.891633][ T8751] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 323.896473][ T8751] __kmalloc+0x4a/0xd0 [ 323.900039][ T8751] tomoyo_encode2.part.0+0xe9/0x3a0 [ 323.905343][ T8751] ? rcu_read_lock_sched_held+0x3e/0x70 [ 323.912645][ T8751] tomoyo_encode+0x2c/0x50 [ 323.917618][ T8751] tomoyo_realpath_from_path+0x185/0x600 [ 323.922830][ T8751] tomoyo_path_number_perm+0x217/0x570 [ 323.927210][ T8751] ? tomoyo_path_number_perm+0x1c1/0x570 [ 323.931974][ T8751] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 323.937048][ T8751] ? wait_for_completion_io_timeout+0x20/0x20 [ 323.941692][ T8751] ? __fget_files+0x26a/0x440 [ 323.945755][ T8751] security_file_ioctl+0x54/0xb0 [ 323.949943][ T8751] __do_compat_sys_ioctl+0x4e/0x2b0 [ 323.954311][ T8751] __do_fast_syscall_32+0x65/0xf0 [ 323.959094][ T8751] do_fast_syscall_32+0x33/0x70 [ 323.963351][ T8751] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 323.968828][ T8751] RIP: 0023:0xf7f32549 [ 323.972650][ T8751] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 323.989409][ T8751] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 323.996574][ T8751] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 324.002646][ T8751] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 324.008482][ T8751] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 324.014616][ T8751] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 324.020638][ T8751] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 324.026268][ T8751] 20:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7ff}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}, @NFT_MSG_NEWTABLE={0x2c, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x4}]}], {0x14}}, 0xb4}}, 0x0) 20:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x6, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {0x0, 0x1}, {}, {0x0, 0x0, {0x0, 0x4}}, {}, {0x0, 0x5, {0x0, 0x1}}, {0x5, 0x800}, {0x0, 0x0, {0x2, 0x8}}, {}, {}, {0x595}, {}, {0x4, 0x9}, {}, {0x0, 0x9}, {0x0, 0x80}, {}, {0x0, 0x0, {0x0, 0x9}}, {0x0, 0x0, {0x2}}, {}, {0x0, 0x7943}, {}, {}, {0x9}, {0xa400}, {0x0, 0x0, {0x0, 0x4}}, {}, {}, {}, {0x40, 0x4}, {0x0, 0x0, {0x2, 0x6}}, {0x0, 0x0, {0x0, 0x20}}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {0x401, 0x0, {0x0, 0x7dc}}]}}}, {{0x254, 0x1, {{}, 0x3, 0x0, 0x0, 0x1, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{}, {}, {}, {0x5}, {0x0, 0x0, {0x0, 0x710}}, {}, {}, {}, {0x7, 0x2, {0x0, 0x6}}, {0x0, 0x44, {0x3}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4716}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {0x9, 0x4, {0x1, 0x7ff}}, {0x0, 0xfff, {0x0, 0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {}, {}, {0xff}, {0x6ef, 0x0, {0x0, 0x5}}, {0x81}, {}, {}, {0x0, 0xea9}, {0x0, 0x0, {0x0, 0x7}}, {0x2}, {0x4}, {0xa3}, {0x6, 0x0, {0x3}}, {0x0, 0x200, {0x2, 0x7}}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}, {0x4, 0x5}, {}, {}, {0x0, 0x0, {0x1}}, {}, {}, {0x0, 0xdb81}, {0x0, 0x0, {0x1, 0x80000000}}, {0x168}, {}, {0xbb}, {0x2, 0x7}, {0x8001, 0x9, {0x1, 0x4}}, {0x0, 0x0, {0x1, 0x4}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x7, 0x400, 0x81, 0x5, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{}, {0x0, 0x4}, {0x0, 0x0, {0x0, 0x4}}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {0x0, 0x0, {0x1}}, {}, {0x1, 0x2}, {0x7, 0x10b7, {0x0, 0x1}}, {0x0, 0x4, {0x0, 0x5}}, {0x0, 0x20, {0x1}}, {}, {0x80}, {0x0, 0x2}, {0x81}, {}, {}, {}, {0x3ff}, {0x0, 0x0, {0x1}}, {0x6}, {}, {}, {}, {}, {}, {0x0, 0xf91}, {}, {}, {}, {0x7}, {}, {}, {0x6, 0x8, {0x1}}]}}}, {{0x254, 0x1, {{0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{}, {}, {0x2}, {0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x401}}, {}, {}, {0x0, 0x0, {0x1, 0x7}}, {0x0, 0x0, {0x2}}, {}, {}, {}, {0x4, 0x0, {0x3, 0x9}}, {0x8, 0xf16, {0x1, 0x3}}, {0x0, 0x0, {0x0, 0x3}}, {}, {}, {}, {0x0, 0x0, {0x2}}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x28, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{}, {}, {}, {0x0, 0x0, {0x0, 0x7}}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x988c}, {0x0, 0x7ff, {0x0, 0xb657}}, {0x0, 0x0, {0x0, 0x8}}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x3}}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}, {}, {}, {0x0, 0xbaf5}, {}, {}, {}, {0x6, 0x7}, {0x400, 0xffff}, {0x6, 0x200, {0x3, 0x5}}, {0x8, 0xf509, {0x3, 0x1000}}, {0x0, 0x0, {0x0, 0x5}}, {}, {0x0, 0x0, {0x2}}, {0x0, 0x0, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{}, {}, {}, {0x0, 0x1}, {0x0, 0x7}, {0x0, 0x0, {0x0, 0x6}}, {}, {0x5, 0x3f}, {0x0, 0x0, {0x0, 0xfffffff9}}, {0x0, 0x1, {0x1}}, {}, {0x0, 0x0, {0x0, 0xc41593b}}, {}, {0x0, 0x0, {0x0, 0x20}}, {}, {}, {}, {0xfff, 0xff00}, {0x9813}, {0x0, 0x0, {0x2}}, {0x23, 0x1ff, {0x1, 0x601f}}, {0x9}, {}, {0xff}]}}}]}, 0x1060}}, 0x0) [ 324.083996][ T8751] ERROR: Out of memory at tomoyo_realpath_from_path. [ 324.174531][ T8758] loop1: detected capacity change from 0 to 128 [ 324.248644][ T8758] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 20:38:13 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 3) 20:38:13 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_ttl={{0x14}}], 0x18}, 0x0) [ 324.333962][ T8758] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 324.374370][ T8762] FAULT_INJECTION: forcing a failure. [ 324.374370][ T8762] name failslab, interval 1, probability 0, space 0, times 0 20:38:13 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:13 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r0) [ 324.416796][ T8762] CPU: 3 PID: 8762 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 324.424181][ T8762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 324.431053][ T8762] Call Trace: [ 324.433407][ T8762] [ 324.435322][ T8762] dump_stack_lvl+0xd1/0x138 [ 324.438294][ T8762] should_fail_ex.cold+0x5/0xa [ 324.441509][ T8762] should_failslab+0x9/0x20 [ 324.446364][ T8762] __kmem_cache_alloc_node+0x5b/0x430 [ 324.446402][ T8762] ? snd_ctl_elem_add_compat+0x51/0x3c0 [ 324.453195][ T8762] ? vfs_fileattr_set+0xbe0/0xbe0 [ 324.456467][ T8762] kmalloc_trace+0x26/0x60 [ 324.459362][ T8762] snd_ctl_elem_add_compat+0x51/0x3c0 [ 324.463153][ T8762] snd_ctl_ioctl_compat+0x144/0x990 [ 324.467748][ T8762] ? snd_ctl_ioctl+0x1100/0x1100 [ 324.472014][ T8762] ? __fget_files+0x26a/0x440 [ 324.475773][ T8762] ? bpf_lsm_file_ioctl+0x9/0x10 [ 324.480028][ T8762] ? snd_ctl_ioctl+0x1100/0x1100 [ 324.484026][ T8762] __do_compat_sys_ioctl+0x255/0x2b0 [ 324.488171][ T8762] __do_fast_syscall_32+0x65/0xf0 [ 324.492214][ T8762] do_fast_syscall_32+0x33/0x70 [ 324.499465][ T8762] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 324.506866][ T8762] RIP: 0023:0xf7f32549 [ 324.510093][ T8762] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 324.536235][ T8762] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 324.547697][ T8762] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 324.555894][ T8762] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 324.565856][ T8762] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 324.577147][ T8762] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 324.585860][ T8762] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 324.598057][ T8762] 20:38:13 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}], {0x14}}, 0xb0}}, 0x0) 20:38:13 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 4) 20:38:13 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:13 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 1) [ 324.703686][ T8775] FAULT_INJECTION: forcing a failure. [ 324.703686][ T8775] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 324.706671][ T8773] loop1: detected capacity change from 0 to 128 [ 324.715599][ T8775] CPU: 1 PID: 8775 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 324.722999][ T8775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 324.728293][ T8775] Call Trace: [ 324.730977][ T8775] [ 324.732888][ T8775] dump_stack_lvl+0xd1/0x138 [ 324.735860][ T8775] should_fail_ex.cold+0x5/0xa [ 324.739024][ T8775] _copy_from_user+0x2e/0x170 [ 324.742322][ T8775] snd_ctl_elem_add_compat+0x72/0x3c0 [ 324.746057][ T8775] snd_ctl_ioctl_compat+0x144/0x990 [ 324.749509][ T8775] ? snd_ctl_ioctl+0x1100/0x1100 [ 324.752953][ T8775] ? __fget_files+0x26a/0x440 [ 324.756213][ T8775] ? bpf_lsm_file_ioctl+0x9/0x10 [ 324.756805][ T8778] loop3: detected capacity change from 0 to 128 [ 324.759333][ T8775] ? snd_ctl_ioctl+0x1100/0x1100 [ 324.768152][ T8775] __do_compat_sys_ioctl+0x255/0x2b0 [ 324.771534][ T8775] __do_fast_syscall_32+0x65/0xf0 [ 324.775559][ T8775] do_fast_syscall_32+0x33/0x70 [ 324.779560][ T8775] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 324.784081][ T8775] RIP: 0023:0xf7f32549 [ 324.787394][ T8775] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 324.806091][ T8775] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 324.814158][ T8775] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 324.821400][ T8778] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 324.821638][ T8775] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 324.823772][ T8773] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 324.844800][ T8775] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 324.844907][ T8778] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 324.845952][ T8773] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 324.852547][ T8775] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 324.852571][ T8775] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 324.852602][ T8775] [ 324.928907][ T8778] FAULT_INJECTION: forcing a failure. [ 324.928907][ T8778] name failslab, interval 1, probability 0, space 0, times 0 [ 324.963398][ T8778] CPU: 3 PID: 8778 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 324.972237][ T8778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 324.985876][ T8778] Call Trace: [ 324.989778][ T8778] [ 324.992722][ T8778] dump_stack_lvl+0xd1/0x138 [ 325.000432][ T8778] should_fail_ex.cold+0x5/0xa [ 325.004570][ T8778] ? getname_flags.part.0+0x50/0x4f0 [ 325.010343][ T8778] should_failslab+0x9/0x20 [ 325.015182][ T8778] kmem_cache_alloc+0x5a/0x430 [ 325.019442][ T8778] getname_flags.part.0+0x50/0x4f0 [ 325.023040][ T8778] getname_flags+0x9e/0xe0 [ 325.026139][ T8778] __ia32_sys_rename+0x59/0xa0 20:38:14 executing program 1: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 5) 20:38:14 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.029400][ T8778] __do_fast_syscall_32+0x65/0xf0 [ 325.033173][ T8778] do_fast_syscall_32+0x33/0x70 [ 325.036448][ T8778] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 325.040737][ T8778] RIP: 0023:0xf7f3f549 [ 325.043431][ T8778] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 325.045800][ T8784] FAULT_INJECTION: forcing a failure. [ 325.045800][ T8784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.055784][ T8778] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 325.055808][ T8778] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 325.055818][ T8778] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.055827][ T8778] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.055835][ T8778] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 325.055844][ T8778] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.055863][ T8778] [ 325.123495][ T8784] CPU: 0 PID: 8784 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 325.133140][ T8784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 325.140872][ T8784] Call Trace: [ 325.143429][ T8784] [ 325.145799][ T8784] dump_stack_lvl+0xd1/0x138 [ 325.149349][ T8784] should_fail_ex.cold+0x5/0xa [ 325.152870][ T8784] _copy_from_user+0x2e/0x170 [ 325.157619][ T8784] snd_ctl_elem_add_compat+0x9e/0x3c0 [ 325.162113][ T8784] snd_ctl_ioctl_compat+0x144/0x990 [ 325.166130][ T8784] ? snd_ctl_ioctl+0x1100/0x1100 [ 325.169969][ T8784] ? __fget_files+0x26a/0x440 [ 325.173299][ T8784] ? bpf_lsm_file_ioctl+0x9/0x10 [ 325.176769][ T8784] ? snd_ctl_ioctl+0x1100/0x1100 [ 325.180544][ T8784] __do_compat_sys_ioctl+0x255/0x2b0 [ 325.184387][ T8784] __do_fast_syscall_32+0x65/0xf0 [ 325.188310][ T8784] do_fast_syscall_32+0x33/0x70 [ 325.192481][ T8784] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 325.197424][ T8784] RIP: 0023:0xf7f32549 [ 325.200818][ T8784] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 325.216490][ T8784] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 325.222807][ T8784] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 325.229697][ T8784] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.235740][ T8784] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.241576][ T8784] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 325.247648][ T8784] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.253141][ T8784] [ 325.361747][ T8789] loop3: detected capacity change from 0 to 128 20:38:14 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 2) 20:38:14 executing program 1: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 6) [ 325.370742][ T8790] FAULT_INJECTION: forcing a failure. [ 325.370742][ T8790] name failslab, interval 1, probability 0, space 0, times 0 20:38:14 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:14 executing program 1: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 325.397758][ T8790] CPU: 1 PID: 8790 Comm: syz-executor.0 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 325.406151][ T8790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 325.410981][ T6541] Buffer I/O error on dev loop3, logical block 0, async page read [ 325.413200][ T8790] Call Trace: [ 325.421745][ T8790] [ 325.423952][ T8790] dump_stack_lvl+0xd1/0x138 [ 325.427714][ T8790] should_fail_ex.cold+0x5/0xa [ 325.431258][ T8790] should_failslab+0x9/0x20 [ 325.434930][ T8790] __kmem_cache_alloc_node+0x5b/0x430 [ 325.439060][ T8790] ? snd_ctl_new+0x5a/0x1a0 [ 325.442428][ T8790] ? snd_ctl_new+0x5a/0x1a0 [ 325.445694][ T8790] __kmalloc+0x4a/0xd0 [ 325.448667][ T8790] ? down_write_killable+0x250/0x250 [ 325.452542][ T8790] snd_ctl_new+0x5a/0x1a0 [ 325.455864][ T8790] snd_ctl_elem_add+0x3fb/0x1220 [ 325.459456][ T8790] ? snd_ctl_open+0x5c0/0x5c0 [ 325.462840][ T8790] snd_ctl_elem_add_compat+0x2bb/0x3c0 [ 325.466965][ T8790] snd_ctl_ioctl_compat+0x144/0x990 [ 325.470668][ T8790] ? snd_ctl_ioctl+0x1100/0x1100 [ 325.474438][ T8790] ? __fget_files+0x26a/0x440 [ 325.478140][ T8790] ? bpf_lsm_file_ioctl+0x9/0x10 [ 325.481675][ T8790] ? snd_ctl_ioctl+0x1100/0x1100 [ 325.485870][ T8790] __do_compat_sys_ioctl+0x255/0x2b0 [ 325.489923][ T8790] __do_fast_syscall_32+0x65/0xf0 [ 325.493638][ T8790] do_fast_syscall_32+0x33/0x70 [ 325.497264][ T8790] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 325.501315][ T8790] RIP: 0023:0xf7f32549 [ 325.503781][ T8790] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 325.516380][ T8790] RSP: 002b:00000000f7f2d5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 325.522601][ T8790] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000c1105517 [ 325.528554][ T8790] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.534415][ T8790] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.540555][ T8790] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 325.546583][ T8790] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.553796][ T8790] 20:38:14 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') [ 325.582032][ T8789] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) (fail_nth: 7) 20:38:14 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.606830][ T8789] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 325.614189][ T8800] loop1: detected capacity change from 0 to 128 [ 325.617833][ T8789] FAULT_INJECTION: forcing a failure. [ 325.617833][ T8789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.628827][ T8789] CPU: 2 PID: 8789 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 325.635810][ T8789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 325.641512][ T8789] Call Trace: [ 325.643874][ T8800] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 325.644068][ T8789] [ 325.644078][ T8789] dump_stack_lvl+0xd1/0x138 [ 325.657793][ T8789] should_fail_ex.cold+0x5/0xa [ 325.660847][ T8789] strncpy_from_user+0x38/0x3c0 [ 325.664001][ T8789] getname_flags.part.0+0x95/0x4f0 [ 325.668039][ T8789] getname_flags+0x9e/0xe0 [ 325.671009][ T8789] __ia32_sys_rename+0x59/0xa0 [ 325.674077][ T8789] __do_fast_syscall_32+0x65/0xf0 [ 325.675950][ T8800] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 325.677234][ T8789] do_fast_syscall_32+0x33/0x70 [ 325.687272][ T8789] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 325.691853][ T8789] RIP: 0023:0xf7f3f549 [ 325.694513][ T8789] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 20:38:14 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.707253][ T8789] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 325.712929][ T8789] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 325.717445][ T8789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.723058][ T8789] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.728201][ T8789] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 325.733375][ T8789] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.738275][ T8789] 20:38:14 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:14 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 3) 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x2, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.782662][ T8813] loop1: detected capacity change from 0 to 128 [ 325.790776][ T8813] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 20:38:14 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.804976][ T8813] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 325.808928][ T8817] loop3: detected capacity change from 0 to 128 20:38:14 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x10, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.819120][ T8817] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 325.828887][ T8817] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 325.837497][ T8817] FAULT_INJECTION: forcing a failure. [ 325.837497][ T8817] name failslab, interval 1, probability 0, space 0, times 0 [ 325.849919][ T8817] CPU: 2 PID: 8817 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 325.856044][ T8817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 325.861646][ T8817] Call Trace: [ 325.863760][ T8817] 20:38:15 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(0x0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x541b, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.865764][ T8817] dump_stack_lvl+0xd1/0x138 [ 325.871241][ T8817] should_fail_ex.cold+0x5/0xa [ 325.874152][ T8817] ? getname_flags.part.0+0x50/0x4f0 [ 325.877559][ T8817] should_failslab+0x9/0x20 [ 325.880561][ T8817] kmem_cache_alloc+0x5a/0x430 [ 325.884631][ T8817] ? strncpy_from_user+0x28b/0x3c0 [ 325.888910][ T8817] getname_flags.part.0+0x50/0x4f0 [ 325.892882][ T8817] getname_flags+0x9e/0xe0 [ 325.896154][ T8817] __ia32_sys_rename+0x68/0xa0 [ 325.899697][ T8817] __do_fast_syscall_32+0x65/0xf0 [ 325.902970][ T8817] do_fast_syscall_32+0x33/0x70 [ 325.905831][ T8817] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 325.909565][ T8817] RIP: 0023:0xf7f3f549 [ 325.912146][ T8817] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5421, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 325.924615][ T8817] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 325.930430][ T8817] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 325.935811][ T8817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.942294][ T8817] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.948220][ T8817] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 325.951104][ T8824] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 325.954172][ T8817] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.954201][ T8817] 20:38:15 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 4) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5450, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5451, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 326.045596][ T8829] loop1: detected capacity change from 0 to 128 [ 326.065417][ T8833] loop3: detected capacity change from 0 to 128 [ 326.067264][ T8829] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 326.072457][ T8833] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 326.099497][ T8829] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 326.107457][ T8833] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 326.122022][ T8833] FAULT_INJECTION: forcing a failure. [ 326.122022][ T8833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.135590][ T8833] CPU: 3 PID: 8833 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 326.147462][ T8833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 326.159480][ T8833] Call Trace: [ 326.162433][ T8833] [ 326.165443][ T8833] dump_stack_lvl+0xd1/0x138 [ 326.169508][ T8833] should_fail_ex.cold+0x5/0xa [ 326.176032][ T8833] strncpy_from_user+0x38/0x3c0 [ 326.179984][ T8833] getname_flags.part.0+0x95/0x4f0 [ 326.184803][ T8833] getname_flags+0x9e/0xe0 [ 326.190301][ T8833] __ia32_sys_rename+0x68/0xa0 [ 326.195657][ T8833] __do_fast_syscall_32+0x65/0xf0 [ 326.202533][ T8833] do_fast_syscall_32+0x33/0x70 [ 326.208748][ T8833] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 326.216269][ T8833] RIP: 0023:0xf7f3f549 [ 326.223125][ T8833] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 326.243031][ T8833] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 326.250705][ T8833] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 326.257715][ T8833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 326.266757][ T8833] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 326.274957][ T8833] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 326.284193][ T8833] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 326.292238][ T8833] 20:38:15 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5452, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 326.338533][ T8841] loop1: detected capacity change from 0 to 128 [ 326.370734][ T6541] blk_print_req_error: 2 callbacks suppressed [ 326.370757][ T6541] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 326.425855][ T8841] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 326.464575][ T8841] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:15 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 5) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x5460, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x8933, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:15 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x400448c9, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 326.563215][ T8856] loop1: detected capacity change from 0 to 128 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x400448dd, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 326.582431][ T8856] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 326.595522][ T8856] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 326.629405][ T8858] loop3: detected capacity change from 0 to 128 [ 326.649145][ T8858] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 326.682620][ T8858] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 326.715134][ T8858] FAULT_INJECTION: forcing a failure. [ 326.715134][ T8858] name failslab, interval 1, probability 0, space 0, times 0 [ 326.728930][ T8858] CPU: 1 PID: 8858 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 326.737908][ T8858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 326.746556][ T8858] Call Trace: [ 326.749386][ T8858] [ 326.752887][ T8858] dump_stack_lvl+0xd1/0x138 [ 326.763676][ T8858] should_fail_ex.cold+0x5/0xa [ 326.767391][ T8858] should_failslab+0x9/0x20 [ 326.771755][ T8858] kmem_cache_alloc_lru+0x65/0x760 [ 326.775414][ T8858] ? __d_alloc+0x32/0x980 [ 326.778847][ T8858] __d_alloc+0x32/0x980 [ 326.782091][ T8858] d_alloc+0x4e/0x240 [ 326.784746][ T8858] __lookup_hash+0xc8/0x180 [ 326.788128][ T8858] do_renameat2+0x656/0xc30 [ 326.791576][ T8858] ? __ia32_sys_link+0xa0/0xa0 [ 326.794759][ T8858] ? __virt_addr_valid+0x61/0x2e0 [ 326.798701][ T8858] ? __phys_addr_symbol+0x30/0x70 [ 326.802065][ T8858] ? strncpy_from_user+0x28b/0x3c0 [ 326.805641][ T8858] ? getname_flags.part.0+0x1dd/0x4f0 [ 326.809014][ T8858] __ia32_sys_rename+0x80/0xa0 [ 326.812100][ T8858] __do_fast_syscall_32+0x65/0xf0 [ 326.815165][ T8858] do_fast_syscall_32+0x33/0x70 [ 326.818413][ T8858] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 326.823870][ T8858] RIP: 0023:0xf7f3f549 [ 326.827883][ T8858] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 20:38:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x400454ca, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 326.841810][ T8858] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 326.847514][ T8858] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 326.852249][ T8858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 326.857136][ T8858] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 326.861957][ T8858] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 326.866938][ T8858] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 326.871918][ T8858] [ 326.985425][ T8867] loop1: detected capacity change from 0 to 128 [ 326.987400][ T8869] loop3: detected capacity change from 0 to 128 [ 326.995539][ T8867] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 20:38:16 executing program 1: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', 0x0) 20:38:16 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 6) 20:38:16 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40046602, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.020277][ T8867] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 327.098921][ T8868] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40049409, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.113480][ T8869] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 327.154399][ T8869] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40086602, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:16 executing program 1: socket(0x2, 0x801, 0x0) [ 327.203216][ T8869] FAULT_INJECTION: forcing a failure. [ 327.203216][ T8869] name failslab, interval 1, probability 0, space 0, times 0 20:38:16 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40186366, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.233007][ T8869] CPU: 1 PID: 8869 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 327.243996][ T8869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 327.252649][ T8869] Call Trace: [ 327.256261][ T8869] [ 327.259647][ T8869] dump_stack_lvl+0xd1/0x138 [ 327.264856][ T8869] should_fail_ex.cold+0x5/0xa [ 327.268538][ T8869] should_failslab+0x9/0x20 [ 327.271310][ T8869] __kmem_cache_alloc_node+0x5b/0x430 [ 327.274393][ T8869] ? udf_find_entry+0x539/0x1230 [ 327.277481][ T8869] kmalloc_trace+0x26/0x60 [ 327.280248][ T8869] udf_find_entry+0x539/0x1230 [ 327.283186][ T8869] ? __lock_acquire+0x166e/0x56d0 [ 327.286075][ T8869] ? empty_dir+0x840/0x840 [ 327.288660][ T8869] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 327.292024][ T8869] ? find_held_lock+0x2d/0x110 [ 327.294792][ T8869] udf_lookup+0x15a/0x270 [ 327.297580][ T8869] ? udf_get_parent+0x210/0x210 [ 327.300711][ T8869] ? d_alloc+0x1bb/0x240 [ 327.303275][ T8869] ? lock_downgrade+0x6e0/0x6e0 [ 327.306348][ T8869] ? rwlock_bug.part.0+0x90/0x90 [ 327.309396][ T8869] ? do_raw_spin_unlock+0x175/0x230 [ 327.312500][ T8869] ? _raw_spin_unlock+0x28/0x40 [ 327.315560][ T8869] ? d_alloc+0x1c0/0x240 [ 327.318224][ T8869] __lookup_hash+0x117/0x180 [ 327.320976][ T8869] do_renameat2+0x656/0xc30 [ 327.323498][ T8869] ? __ia32_sys_link+0xa0/0xa0 [ 327.326302][ T8869] ? __virt_addr_valid+0x61/0x2e0 [ 327.329459][ T8869] ? __phys_addr_symbol+0x30/0x70 [ 327.332848][ T8869] ? strncpy_from_user+0x28b/0x3c0 [ 327.336038][ T8869] ? getname_flags.part.0+0x1dd/0x4f0 [ 327.339079][ T8869] __ia32_sys_rename+0x80/0xa0 [ 327.342713][ T8869] __do_fast_syscall_32+0x65/0xf0 [ 327.346022][ T8869] do_fast_syscall_32+0x33/0x70 [ 327.349044][ T8869] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 327.353409][ T8869] RIP: 0023:0xf7f3f549 [ 327.356014][ T8869] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 327.362495][ T8883] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 327.368551][ T8869] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 327.368624][ T8869] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 327.368642][ T8869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.368657][ T8869] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.402534][ T8869] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 327.408098][ T8869] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.413499][ T8869] [ 327.501600][ T8892] loop3: detected capacity change from 0 to 128 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x401c5820, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:16 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) 20:38:16 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 7) 20:38:16 executing program 1: r0 = getpid() get_robust_list(r0, 0x0, &(0x7f00000001c0)) [ 327.509984][ T8892] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:16 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x88240, 0x0) 20:38:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x4020940d, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.541690][ T8887] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 327.543190][ T8892] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 327.560545][ T8892] FAULT_INJECTION: forcing a failure. [ 327.560545][ T8892] name failslab, interval 1, probability 0, space 0, times 0 [ 327.584392][ T8892] CPU: 2 PID: 8892 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 20:38:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f00000000c0)={0x7, 'batadv_slave_1\x00'}) [ 327.591810][ T8892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 327.598916][ T8892] Call Trace: [ 327.601259][ T8892] [ 327.603828][ T8892] dump_stack_lvl+0xd1/0x138 [ 327.606958][ T8892] should_fail_ex.cold+0x5/0xa [ 327.611126][ T8892] should_failslab+0x9/0x20 [ 327.615463][ T8892] kmem_cache_alloc_lru+0x65/0x760 [ 327.621933][ T8892] ? udf_alloc_inode+0x28/0x240 [ 327.628432][ T8892] ? udf_free_in_core_inode+0x30/0x30 [ 327.633034][ T8892] udf_alloc_inode+0x28/0x240 [ 327.638146][ T8892] ? udf_free_in_core_inode+0x30/0x30 [ 327.643559][ T8892] alloc_inode+0x61/0x230 [ 327.648376][ T8892] iget_locked+0x1bb/0x700 [ 327.654507][ T8892] ? udf_get_pblock+0xf4/0x1c0 [ 327.660024][ T8892] __udf_iget+0xf1/0x3910 [ 327.664855][ T8892] ? empty_dir+0x840/0x840 [ 327.670154][ T8892] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 327.676118][ T8892] ? find_held_lock+0x2d/0x110 [ 327.682137][ T8892] ? udf_write_inode+0x60/0x60 [ 327.687231][ T8892] udf_lookup+0x216/0x270 [ 327.692346][ T8892] ? udf_get_parent+0x210/0x210 [ 327.697226][ T8892] ? d_alloc+0x1bb/0x240 [ 327.702479][ T8892] ? lock_downgrade+0x6e0/0x6e0 [ 327.708390][ T8892] ? rwlock_bug.part.0+0x90/0x90 [ 327.715404][ T8892] ? do_raw_spin_unlock+0x175/0x230 [ 327.723165][ T8892] ? _raw_spin_unlock+0x28/0x40 [ 327.728119][ T8892] ? d_alloc+0x1c0/0x240 [ 327.731736][ T8892] __lookup_hash+0x117/0x180 [ 327.735751][ T8892] do_renameat2+0x656/0xc30 [ 327.739617][ T8892] ? __ia32_sys_link+0xa0/0xa0 [ 327.743632][ T8892] ? __virt_addr_valid+0x61/0x2e0 [ 327.748597][ T8892] ? __phys_addr_symbol+0x30/0x70 [ 327.754029][ T8892] ? strncpy_from_user+0x28b/0x3c0 [ 327.759031][ T8892] ? getname_flags.part.0+0x1dd/0x4f0 [ 327.763724][ T8892] __ia32_sys_rename+0x80/0xa0 [ 327.769676][ T8892] __do_fast_syscall_32+0x65/0xf0 [ 327.775198][ T8892] do_fast_syscall_32+0x33/0x70 [ 327.780534][ T8892] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 327.790129][ T8892] RIP: 0023:0xf7f3f549 [ 327.796456][ T8892] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 327.817109][ T8892] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 327.823343][ T8892] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 327.830432][ T8892] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.837254][ T8892] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.844483][ T8892] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 327.851661][ T8892] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.858294][ T8892] 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x402c5828, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 8) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x402c5829, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, 0x0) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x402c582a, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.949499][ T8905] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 327.959913][ T8910] loop3: detected capacity change from 0 to 128 [ 327.963128][ T6541] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 20:38:17 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000001140), 0xffffffffffffffff) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x402c582b, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 327.993027][ T8910] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:17 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 328.037978][ T8910] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x402c5839, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 328.059493][ T8910] FAULT_INJECTION: forcing a failure. [ 328.059493][ T8910] name failslab, interval 1, probability 0, space 0, times 0 [ 328.079210][ T8910] CPU: 2 PID: 8910 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 328.087917][ T8910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 328.095227][ T8910] Call Trace: [ 328.098660][ T8910] [ 328.101214][ T8910] dump_stack_lvl+0xd1/0x138 [ 328.105122][ T8910] should_fail_ex.cold+0x5/0xa [ 328.110093][ T8910] ? security_inode_alloc+0x38/0x160 [ 328.115916][ T8910] should_failslab+0x9/0x20 [ 328.121244][ T8910] kmem_cache_alloc+0x5a/0x430 [ 328.126580][ T8910] security_inode_alloc+0x38/0x160 [ 328.131411][ T8910] inode_init_always+0xbfa/0xef0 [ 328.135576][ T8910] alloc_inode+0x82/0x230 [ 328.139114][ T8910] iget_locked+0x1bb/0x700 [ 328.142796][ T8910] ? udf_get_pblock+0xf4/0x1c0 [ 328.148846][ T8910] __udf_iget+0xf1/0x3910 [ 328.152887][ T8910] ? empty_dir+0x840/0x840 [ 328.156636][ T8910] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 328.161536][ T8910] ? find_held_lock+0x2d/0x110 [ 328.166159][ T8910] ? udf_write_inode+0x60/0x60 [ 328.170183][ T8910] udf_lookup+0x216/0x270 [ 328.173394][ T8910] ? udf_get_parent+0x210/0x210 [ 328.178317][ T8910] ? d_alloc+0x1bb/0x240 [ 328.182405][ T8910] ? lock_downgrade+0x6e0/0x6e0 [ 328.186990][ T8910] ? rwlock_bug.part.0+0x90/0x90 [ 328.192225][ T8910] ? do_raw_spin_unlock+0x175/0x230 [ 328.196144][ T8910] ? _raw_spin_unlock+0x28/0x40 [ 328.199761][ T8910] ? d_alloc+0x1c0/0x240 [ 328.203801][ T8910] __lookup_hash+0x117/0x180 [ 328.207582][ T8910] do_renameat2+0x656/0xc30 [ 328.211196][ T8910] ? __ia32_sys_link+0xa0/0xa0 [ 328.215744][ T8910] ? __virt_addr_valid+0x61/0x2e0 [ 328.222994][ T8910] ? __phys_addr_symbol+0x30/0x70 [ 328.228484][ T8910] ? strncpy_from_user+0x28b/0x3c0 [ 328.232327][ T8910] ? getname_flags.part.0+0x1dd/0x4f0 [ 328.236142][ T8910] __ia32_sys_rename+0x80/0xa0 [ 328.239494][ T8910] __do_fast_syscall_32+0x65/0xf0 [ 328.243152][ T8910] do_fast_syscall_32+0x33/0x70 [ 328.247073][ T8910] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 328.252970][ T8910] RIP: 0023:0xf7f3f549 [ 328.255753][ T8910] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 328.270387][ T8910] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 328.278327][ T8910] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 328.286115][ T8910] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 328.291631][ T8910] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 328.297774][ T8910] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 328.302869][ T8910] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 328.308243][ T8920] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 328.308449][ T8910] 20:38:17 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 9) 20:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4840008}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40405514, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpgid(0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) [ 328.404667][ T8933] loop3: detected capacity change from 0 to 128 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40405515, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 328.413818][ T6541] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 20:38:17 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{}, {}, {}, {}, {}, {0x0, 0x0, {0x0, 0x1}}, {}, {}, {0xfcbe}, {0x0, 0x9}, {}, {}, {}, {0x0, 0x0, {0x0, 0xb64d}}, {}, {0x0, 0x0, {0x1, 0x1}}, {0x0, 0x0, {0x0, 0x100}}, {0xffe0}, {0x0, 0x0, {0x2}}, {0x0, 0x0, {0x0, 0x8001}}, {}, {}, {}, {0x0, 0x3}, {}, {}, {}, {}, {0x0, 0x5}, {}, {}, {0x3, 0x7}, {}, {}, {0x100}, {}, {}, {}, {}, {0x401}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{0x0, 0x0, {0x0, 0x7}}, {}, {}, {0x0, 0x6c91}, {0xc17}, {}, {}, {}, {0x7, 0x0, {0x0, 0x6}}, {0x0, 0x0, {0x3}}, {}, {}, {}, {}, {0x1, 0x1, {0x2}}, {0x0, 0x6}, {}, {0x1000}, {0x0, 0x0, {0x0, 0x8000000}}, {0x0, 0x2}, {0xff8, 0x0, {0x2}}, {}, {}, {}, {0x0, 0x8}, {0x5}, {}, {}, {}, {0x0, 0xfffc}, {}, {0x6, 0x4}, {}, {0x0, 0x9}, {}, {}, {0x0, 0x8001}, {0x0, 0x6}]}}}, {{0x254, 0x1, {{0x1}, 0xd0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{}, {0x0, 0x7e46}, {0x0, 0x233}, {0x0, 0x1ff, {0x0, 0x81}}, {0x0, 0x0, {0x0, 0x5}}, {0x0, 0x0, {0x0, 0xfffffbff}}, {0x0, 0x0, {0x0, 0x4}}, {0x6}, {}, {0x40, 0x0, {0x0, 0x7}}, {0x0, 0x0, {0x0, 0xd96d}}, {}, {0x0, 0x0, {0x0, 0x2}}, {0x0, 0x0, {0x3}}, {}, {0x0, 0x7ff}, {}, {}, {}, {0x81}, {0x3f}, {0x0, 0x0, {0x0, 0x7fff}}, {}, {}, {0x2}, {0x0, 0x0, {0x1}}, {}, {}, {0x1}, {0xffe0, 0x0, {0x0, 0x80000000}}, {0x168, 0x0, {0x3}}, {0x0, 0x0, {0x2}}, {0x0, 0x0, {0x1}}, {}, {0x0, 0x9}, {}, {}, {0x0, 0x0, {0x0, 0x8}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{0x1000, 0x0, {0x0, 0x200}}, {0xdf3d}, {0x0, 0x0, {0x3}}, {0x4}, {}, {0x7ff, 0x7}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x100, {0x1, 0x3}}, {0x0, 0x0, {0x0, 0xfb8}}, {0x0, 0x8, {0x0, 0x101}}, {0x0, 0x0, {0x3}}, {0x0, 0x10b7}, {}, {}, {0x6}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, {0x1}}, {}, {0x6}, {}, {0x0, 0x200}, {}, {0x0, 0xb37}, {}, {}, {}, {0x0, 0x0, {0x0, 0x3}}, {0x40}, {0x7}, {0x0, 0x0, {0x0, 0x2}}, {0xfffd}, {0x0, 0x0, {0x1}}]}}}, {{0x254, 0x1, {{0x3, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{0x0, 0xe0, {0x0, 0xfff}}, {}, {0x0, 0x0, {0x0, 0xfffffc00}}, {}, {0x0, 0x0, {0x0, 0x1}}, {}, {}, {0x6}, {0x0, 0x0, {0x1, 0x1ff}}, {}, {0x5, 0x4, {0x1}}, {0x892d, 0x0, {0xe10ac8674027e10a}}, {0x0, 0x1a2}, {0x0, 0x40, {0x0, 0x7}}, {}, {}, {0x0, 0x0, {0x0, 0x6}}, {}, {}, {0x0, 0x4}, {0x0, 0x800}, {0x7, 0x3, {0x0, 0x40}}, {0x7}, {0x4}, {0x8, 0xf16}, {}, {0x0, 0x0, {0x2, 0x7}}, {0xcf83, 0x0, {0x0, 0x1}}, {0x0, 0x400}, {0x0, 0x0, {0x2}}, {0x0, 0x389, {0x0, 0xfff}}, {0x0, 0x0, {0x0, 0x6}}, {}, {0x0, 0x0, {0x0, 0x5}}, {0x8, 0x0, {0x3}}, {0x1, 0x8}, {}, {0xfffc}, {0x5, 0x2}]}}}, {{0x254, 0x1, {{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{0x0, 0x5, {0x0, 0x9}}, {0x1f}, {}, {}, {0x400}, {}, {0x0, 0x40, {0x2}}, {0xc0, 0x1}, {0x100, 0x988c, {0x1}}, {}, {0x0, 0x7094, {0x1}}, {0x9, 0x400}, {}, {0x0, 0x7f, {0x2}}, {}, {}, {0x4, 0x0, {0x0, 0x7}}, {0x8000}, {0x64, 0xff80}, {0x0, 0x8000}, {0x0, 0x0, {0x0, 0xfff}}, {}, {}, {0x0, 0x0, {0x1, 0xfffffff8}}, {0x8001, 0x0, {0x1}}, {0x0, 0x3}, {0x1, 0x0, {0x0, 0xfffffffd}}, {0x0, 0x0, {0x0, 0x6}}, {}, {0x0, 0x1, {0x0, 0x3}}, {0x0, 0x5, {0x0, 0x4}}, {0x0, 0x0, {0x3}}, {}, {0x0, 0xffff, {0x1}}, {0x6, 0x0, {0x3, 0x5}}, {}, {0x0, 0x406, {0x0, 0x5}}, {0x0, 0x7f}, {0x0, 0x8, {0x0, 0x7}}, {0x0, 0x0, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{0x0, 0x0, {0x1}}, {}, {0x8, 0x0, {0x1}}, {0x5, 0x0, {0x3}}, {0x0, 0x7, {0x1, 0x8}}, {0x0, 0x0, {0x2}}, {0x0, 0x0, {0x3, 0x2}}, {0x5, 0x3f}, {0x4, 0x0, {0x2, 0xfffffff9}}, {0x40}, {0x3e6c, 0x0, {0x0, 0x7ff}}, {0x7f, 0x0, {0x2}}, {0x5, 0x0, {0x3}}, {0x0, 0x4d, {0x3, 0x20}}, {0x9, 0x0, {0x3}}, {}, {}, {0xfff, 0xff00, {0x2, 0x15}}, {0x0, 0xff}, {0x8, 0x9}, {0x23, 0x0, {0x1, 0x601f}}, {0x9, 0x0, {0x0, 0x2}}, {0x0, 0x7fff, {0x1}}, {0x0, 0xfe00, {0x0, 0xfffffff8}}, {0x0, 0x0, {0x1, 0x7f}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x4000011}, 0x4840) [ 328.438911][ T8933] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 328.452954][ T8933] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 328.461782][ T8929] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:17 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 10) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x80045500, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') write$FUSE_NOTIFY_STORE(r0, 0x0, 0x2b) 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x800455d1, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@multicast2, @private=0xa010102}, 0xc) [ 328.557202][ T8944] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 328.571422][ T8947] loop3: detected capacity change from 0 to 128 [ 328.595210][ T8947] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x80046601, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) accept4(r0, 0x0, 0x0, 0x1800) [ 328.627548][ T8947] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 328.664640][ T8947] FAULT_INJECTION: forcing a failure. [ 328.664640][ T8947] name failslab, interval 1, probability 0, space 0, times 0 [ 328.676495][ T8947] CPU: 2 PID: 8947 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 328.686973][ T8947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 328.696221][ T8947] Call Trace: [ 328.700096][ T8947] [ 328.703371][ T8947] dump_stack_lvl+0xd1/0x138 [ 328.708283][ T8947] should_fail_ex.cold+0x5/0xa [ 328.712928][ T8947] should_failslab+0x9/0x20 [ 328.717484][ T8947] __kmem_cache_alloc_node+0x5b/0x430 [ 328.723219][ T8947] ? udf_alloc_i_data+0x1f/0x70 [ 328.728727][ T8947] ? udf_alloc_i_data+0x1f/0x70 [ 328.733787][ T8947] __kmalloc+0x4a/0xd0 [ 328.738317][ T8947] ? udf_read_tagged+0x365/0x6a0 [ 328.743816][ T8947] udf_alloc_i_data+0x1f/0x70 [ 328.748562][ T8947] __udf_iget+0x263d/0x3910 [ 328.753696][ T8947] ? udf_write_inode+0x60/0x60 [ 328.759049][ T8947] udf_lookup+0x216/0x270 [ 328.763644][ T8947] ? udf_get_parent+0x210/0x210 [ 328.768842][ T8947] ? d_alloc+0x1bb/0x240 [ 328.773506][ T8947] ? lock_downgrade+0x6e0/0x6e0 [ 328.780447][ T8947] ? rwlock_bug.part.0+0x90/0x90 [ 328.786452][ T8947] ? do_raw_spin_unlock+0x175/0x230 [ 328.792420][ T8947] ? _raw_spin_unlock+0x28/0x40 [ 328.797192][ T8947] ? d_alloc+0x1c0/0x240 [ 328.800912][ T8947] __lookup_hash+0x117/0x180 [ 328.806042][ T8947] do_renameat2+0x656/0xc30 [ 328.810223][ T8947] ? __ia32_sys_link+0xa0/0xa0 [ 328.814784][ T8947] ? __virt_addr_valid+0x61/0x2e0 [ 328.820064][ T8947] ? __phys_addr_symbol+0x30/0x70 [ 328.825285][ T8947] ? strncpy_from_user+0x28b/0x3c0 [ 328.831595][ T8947] ? getname_flags.part.0+0x1dd/0x4f0 [ 328.836838][ T8947] __ia32_sys_rename+0x80/0xa0 [ 328.840918][ T8947] __do_fast_syscall_32+0x65/0xf0 [ 328.846280][ T8947] do_fast_syscall_32+0x33/0x70 [ 328.851553][ T8947] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 328.858297][ T8947] RIP: 0023:0xf7f3f549 [ 328.863421][ T8947] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 328.887278][ T8947] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 328.897753][ T8947] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 328.907532][ T8947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 328.916004][ T8947] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 328.925959][ T8947] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 328.935944][ T8947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 328.944331][ T8947] 20:38:18 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 11) 20:38:18 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x80086301, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x2c}}, 0x0) [ 329.020784][ T8958] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 329.039786][ T8962] loop3: detected capacity change from 0 to 128 20:38:18 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x80086601, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.049152][ T8962] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 329.061942][ T8962] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 329.076857][ T8962] FAULT_INJECTION: forcing a failure. [ 329.076857][ T8962] name failslab, interval 1, probability 0, space 0, times 0 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x801c581f, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.112969][ T8962] CPU: 1 PID: 8962 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 20:38:18 executing program 1: syz_clone3(&(0x7f0000001240)={0x40000000, &(0x7f0000000000), &(0x7f0000000040), 0x0, {}, &(0x7f0000000140)=""/228, 0xe4, &(0x7f0000000240)=""/4096, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) syz_open_procfs(0xffffffffffffffff, 0x0) [ 329.124400][ T8962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 329.135362][ T8962] Call Trace: [ 329.139067][ T8962] [ 329.142434][ T8962] dump_stack_lvl+0xd1/0x138 [ 329.147044][ T8962] should_fail_ex.cold+0x5/0xa [ 329.152525][ T8962] should_failslab+0x9/0x20 [ 329.157404][ T8962] kmem_cache_alloc_lru+0x65/0x760 [ 329.162500][ T8962] ? __d_alloc+0x32/0x980 [ 329.165592][ T8962] __d_alloc+0x32/0x980 [ 329.168464][ T8962] d_alloc+0x4e/0x240 [ 329.171291][ T8962] __lookup_hash+0xc8/0x180 [ 329.176165][ T8962] do_renameat2+0x6db/0xc30 [ 329.179814][ T8962] ? __ia32_sys_link+0xa0/0xa0 [ 329.183713][ T8962] ? __virt_addr_valid+0x61/0x2e0 [ 329.187789][ T8962] ? __phys_addr_symbol+0x30/0x70 [ 329.191220][ T8962] ? strncpy_from_user+0x28b/0x3c0 [ 329.195274][ T8968] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 329.195485][ T8962] ? getname_flags.part.0+0x1dd/0x4f0 [ 329.205210][ T8962] __ia32_sys_rename+0x80/0xa0 [ 329.208369][ T8962] __do_fast_syscall_32+0x65/0xf0 [ 329.211961][ T8962] do_fast_syscall_32+0x33/0x70 [ 329.215566][ T8962] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 329.219775][ T8962] RIP: 0023:0xf7f3f549 [ 329.223524][ T8962] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 329.239481][ T8962] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 329.247181][ T8962] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 329.253717][ T8962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 329.260205][ T8962] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 329.268179][ T8962] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 329.275371][ T8962] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 329.281080][ T8962] 20:38:18 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 12) 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x81785501, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={0x0, 0x0, &(0x7f0000005980)={&(0x7f0000004900)={0x268, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea"}}}]}, 0x268}}, 0x0) 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0045516, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.368998][ T8981] loop3: detected capacity change from 0 to 128 [ 329.376460][ T6541] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 329.396530][ T8979] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000080)={0x1c, 0x0, 0x3, 0x401, 0x0, 0x0, {}, [@generic="318ff9e9a0f0"]}, 0x1c}}, 0x0) [ 329.407947][ T8981] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:18 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc00455d0, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.448356][ T8988] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 329.448352][ T8981] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 329.451760][ T8981] FAULT_INJECTION: forcing a failure. [ 329.451760][ T8981] name failslab, interval 1, probability 0, space 0, times 0 [ 329.474380][ T8981] CPU: 2 PID: 8981 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 329.482792][ T8981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 329.489353][ T8981] Call Trace: [ 329.492017][ T8981] [ 329.494825][ T8981] dump_stack_lvl+0xd1/0x138 [ 329.498308][ T8981] should_fail_ex.cold+0x5/0xa [ 329.503359][ T8981] should_failslab+0x9/0x20 [ 329.507871][ T8981] __kmem_cache_alloc_node+0x5b/0x430 [ 329.513573][ T8981] ? __d_alloc+0x657/0x980 [ 329.518453][ T8981] ? rcu_read_lock_sched_held+0x3e/0x70 [ 329.523248][ T8981] ? __d_alloc+0x657/0x980 [ 329.526472][ T8981] __kmalloc+0x4a/0xd0 [ 329.529998][ T8981] __d_alloc+0x657/0x980 [ 329.534023][ T8981] d_alloc+0x4e/0x240 [ 329.537748][ T8981] __lookup_hash+0xc8/0x180 [ 329.542337][ T8981] do_renameat2+0x6db/0xc30 [ 329.546838][ T8981] ? __ia32_sys_link+0xa0/0xa0 [ 329.551535][ T8981] ? __virt_addr_valid+0x61/0x2e0 [ 329.557413][ T8981] ? __phys_addr_symbol+0x30/0x70 [ 329.562506][ T8981] ? strncpy_from_user+0x28b/0x3c0 [ 329.566857][ T8981] ? getname_flags.part.0+0x1dd/0x4f0 [ 329.571609][ T8981] __ia32_sys_rename+0x80/0xa0 [ 329.575999][ T8981] __do_fast_syscall_32+0x65/0xf0 [ 329.580378][ T8981] do_fast_syscall_32+0x33/0x70 [ 329.585219][ T8981] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 329.590053][ T8981] RIP: 0023:0xf7f3f549 [ 329.593337][ T8981] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 329.608745][ T8981] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 329.615774][ T8981] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 329.621597][ T8981] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 329.628185][ T8981] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 329.636444][ T8981] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 329.644610][ T8981] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 329.650818][ T8981] [ 329.724171][ T8992] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0045878, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000025c0), 0x48800, 0x0) 20:38:18 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 13) 20:38:18 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) r1 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r2 = getpgid(r1) getpgid(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000000)=0xfff) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r4, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.768455][ T9001] loop3: detected capacity change from 0 to 128 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0045878, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) [ 329.798827][ T9001] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 329.805996][ T9004] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc008551a, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.827142][ T9001] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:19 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.933795][ T9001] FAULT_INJECTION: forcing a failure. [ 329.933795][ T9001] name failslab, interval 1, probability 0, space 0, times 0 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc008551c, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.949288][ T9001] CPU: 1 PID: 9001 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 329.951025][ T9012] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 329.956435][ T9001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 329.956450][ T9001] Call Trace: [ 329.956462][ T9001] [ 329.956469][ T9001] dump_stack_lvl+0xd1/0x138 [ 329.956495][ T9001] should_fail_ex.cold+0x5/0xa 20:38:19 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 329.956513][ T9001] should_failslab+0x9/0x20 [ 329.956533][ T9001] __kmem_cache_alloc_node+0x5b/0x430 [ 329.956548][ T9001] ? udf_find_entry+0x539/0x1230 [ 329.956572][ T9001] kmalloc_trace+0x26/0x60 [ 329.956590][ T9001] udf_find_entry+0x539/0x1230 [ 330.012543][ T9016] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 330.013260][ T9001] ? __lock_acquire+0x166e/0x56d0 [ 330.013297][ T9001] ? empty_dir+0x840/0x840 [ 330.013335][ T9001] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 330.013356][ T9001] ? memcg_slab_post_alloc_hook+0x249/0x480 [ 330.013432][ T9001] udf_lookup+0x15a/0x270 [ 330.049857][ T9001] ? udf_get_parent+0x210/0x210 [ 330.054850][ T9001] ? d_alloc+0x1bb/0x240 [ 330.058807][ T9001] ? lock_downgrade+0x6e0/0x6e0 [ 330.063286][ T9001] ? rwlock_bug.part.0+0x90/0x90 [ 330.067049][ T9001] ? do_raw_spin_unlock+0x175/0x230 [ 330.070693][ T9001] ? _raw_spin_unlock+0x28/0x40 [ 330.074680][ T9001] ? d_alloc+0x1c0/0x240 [ 330.077810][ T9001] __lookup_hash+0x117/0x180 [ 330.080923][ T9001] do_renameat2+0x6db/0xc30 [ 330.084775][ T9001] ? __ia32_sys_link+0xa0/0xa0 [ 330.089154][ T9001] ? __virt_addr_valid+0x61/0x2e0 [ 330.093369][ T9001] ? __phys_addr_symbol+0x30/0x70 [ 330.096950][ T9001] ? strncpy_from_user+0x28b/0x3c0 [ 330.100668][ T9001] ? getname_flags.part.0+0x1dd/0x4f0 [ 330.106106][ T9001] __ia32_sys_rename+0x80/0xa0 [ 330.111164][ T9001] __do_fast_syscall_32+0x65/0xf0 [ 330.115143][ T9001] do_fast_syscall_32+0x33/0x70 [ 330.119703][ T9001] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 330.124785][ T9001] RIP: 0023:0xf7f3f549 [ 330.128535][ T9001] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 330.144969][ T9001] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 330.151341][ T9001] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 330.157952][ T9001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 330.163423][ T9001] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 330.169395][ T9001] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 330.176158][ T9001] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 330.183328][ T9001] 20:38:19 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 14) 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0189436, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:19 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) dup(r0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(0x0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:19 executing program 1: syz_clone3(&(0x7f0000001240)={0x40000000, 0x0, 0x0, &(0x7f0000000080), {}, &(0x7f0000000140)=""/228, 0xe4, 0x0, 0x0}, 0x58) 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc020660b, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 330.243234][ T9024] loop3: detected capacity change from 0 to 128 [ 330.244563][ T9020] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present [ 330.251920][ T9024] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 330.267468][ T9024] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 330.291992][ T9024] FAULT_INJECTION: forcing a failure. [ 330.291992][ T9024] name failslab, interval 1, probability 0, space 0, times 0 20:38:19 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x101101) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 330.312019][ T9024] CPU: 0 PID: 9024 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0405519, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 330.320673][ T9024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 330.329053][ T9024] Call Trace: [ 330.331989][ T9024] [ 330.335269][ T9024] dump_stack_lvl+0xd1/0x138 [ 330.339488][ T9024] should_fail_ex.cold+0x5/0xa [ 330.344379][ T9024] should_failslab+0x9/0x20 [ 330.350126][ T9024] __kmem_cache_alloc_node+0x5b/0x430 [ 330.355473][ T9024] ? tomoyo_realpath_from_path+0xc3/0x600 [ 330.361751][ T9024] ? tomoyo_realpath_from_path+0xc3/0x600 [ 330.366604][ T9024] __kmalloc+0x4a/0xd0 [ 330.370369][ T9024] tomoyo_realpath_from_path+0xc3/0x600 [ 330.376045][ T9024] ? tomoyo_profile+0x46/0x60 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0485510, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 330.381176][ T9024] tomoyo_path2_perm+0x276/0x6e0 [ 330.387014][ T9024] ? tomoyo_path2_perm+0x20e/0x6e0 [ 330.392181][ T9024] ? tomoyo_mkdev_perm+0x530/0x530 [ 330.396937][ T9024] ? do_raw_spin_lock+0x124/0x2b0 [ 330.401019][ T9024] ? udf_lookup+0xdd/0x270 [ 330.404051][ T9024] ? hook_file_open+0x9c0/0x9c0 [ 330.407676][ T9024] tomoyo_path_rename+0x102/0x1b0 [ 330.411684][ T9024] ? tomoyo_sb_pivotroot+0x30/0x30 [ 330.415228][ T9024] ? do_raw_spin_unlock+0x175/0x230 [ 330.418902][ T9024] ? _raw_spin_unlock+0x28/0x40 [ 330.422714][ T9024] security_path_rename+0x121/0x230 [ 330.427268][ T9024] do_renameat2+0x476/0xc30 [ 330.430438][ T9024] ? __ia32_sys_link+0xa0/0xa0 [ 330.435113][ T9024] ? __virt_addr_valid+0x61/0x2e0 [ 330.439414][ T9024] ? __phys_addr_symbol+0x30/0x70 [ 330.443310][ T9024] ? strncpy_from_user+0x28b/0x3c0 [ 330.447137][ T9024] ? getname_flags.part.0+0x1dd/0x4f0 [ 330.451528][ T9024] __ia32_sys_rename+0x80/0xa0 [ 330.456028][ T9024] __do_fast_syscall_32+0x65/0xf0 [ 330.459867][ T9024] do_fast_syscall_32+0x33/0x70 [ 330.463410][ T9024] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 330.468641][ T9024] RIP: 0023:0xf7f3f549 [ 330.472259][ T9024] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 330.486202][ T9024] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 330.492393][ T9024] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 330.498817][ T9024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 330.504969][ T9024] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 330.510499][ T9024] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 330.516303][ T9024] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 330.521981][ T9024] [ 330.531166][ T9024] ERROR: Out of memory at tomoyo_realpath_from_path. 20:38:19 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 15) 20:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000002740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000002780)={0x14}, 0x14}}, 0x0) 20:38:19 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:19 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105518, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 330.604338][ T9044] loop3: detected capacity change from 0 to 128 20:38:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x2, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) [ 330.644306][ T9044] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x2, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) [ 330.674813][ T9044] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 330.696970][ T9044] FAULT_INJECTION: forcing a failure. [ 330.696970][ T9044] name failslab, interval 1, probability 0, space 0, times 0 [ 330.707577][ T9044] CPU: 3 PID: 9044 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 330.715685][ T9049] snd_dummy snd_dummy.0: control 0:0:5:syz0:1 is already present 20:38:19 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001340), 0xffffffffffffffff) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(0xffffffffffffffff, 0x13, &(0x7f0000001440), 0x2) accept4(0xffffffffffffffff, &(0x7f0000001480)=@x25, 0x0, 0x0) [ 330.715938][ T9044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 330.715990][ T9044] Call Trace: [ 330.715999][ T9044] [ 330.716011][ T9044] dump_stack_lvl+0xd1/0x138 [ 330.741689][ T9044] should_fail_ex.cold+0x5/0xa [ 330.745788][ T9044] should_failslab+0x9/0x20 [ 330.749666][ T9044] __kmem_cache_alloc_node+0x5b/0x430 [ 330.755019][ T9044] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 330.759816][ T9044] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 330.765289][ T9044] __kmalloc+0x4a/0xd0 [ 330.768904][ T9044] tomoyo_encode2.part.0+0xe9/0x3a0 [ 330.774411][ T9044] ? rcu_read_lock_sched_held+0x3e/0x70 [ 330.780503][ T9044] tomoyo_encode+0x2c/0x50 [ 330.784939][ T9044] tomoyo_realpath_from_path+0x185/0x600 [ 330.790751][ T9044] tomoyo_path2_perm+0x276/0x6e0 [ 330.795830][ T9044] ? tomoyo_path2_perm+0x20e/0x6e0 [ 330.801085][ T9044] ? tomoyo_mkdev_perm+0x530/0x530 [ 330.806649][ T9044] ? do_raw_spin_lock+0x124/0x2b0 [ 330.812201][ T9044] ? udf_lookup+0xdd/0x270 [ 330.816325][ T9044] ? hook_file_open+0x9c0/0x9c0 [ 330.820778][ T9044] tomoyo_path_rename+0x102/0x1b0 [ 330.825056][ T9044] ? tomoyo_sb_pivotroot+0x30/0x30 [ 330.829658][ T9044] ? do_raw_spin_unlock+0x175/0x230 [ 330.834253][ T9044] ? _raw_spin_unlock+0x28/0x40 [ 330.839129][ T9044] security_path_rename+0x121/0x230 [ 330.844114][ T9044] do_renameat2+0x476/0xc30 [ 330.848268][ T9044] ? __ia32_sys_link+0xa0/0xa0 [ 330.852714][ T9044] ? __virt_addr_valid+0x61/0x2e0 [ 330.856937][ T9044] ? __phys_addr_symbol+0x30/0x70 [ 330.861663][ T9044] ? strncpy_from_user+0x28b/0x3c0 [ 330.866143][ T9044] ? getname_flags.part.0+0x1dd/0x4f0 [ 330.870140][ T9044] __ia32_sys_rename+0x80/0xa0 [ 330.873992][ T9044] __do_fast_syscall_32+0x65/0xf0 [ 330.877729][ T9044] do_fast_syscall_32+0x33/0x70 [ 330.881167][ T9044] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 330.890829][ T9044] RIP: 0023:0xf7f3f549 [ 330.894939][ T9044] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 330.911215][ T9044] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 330.917283][ T9044] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 330.923648][ T9044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 330.929493][ T9044] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 330.935110][ T9044] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 330.941367][ T9044] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 330.949235][ T9044] [ 330.979613][ T9044] ERROR: Out of memory at tomoyo_realpath_from_path. 20:38:20 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 16) 20:38:20 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc2c45512, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:20 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x14) [ 331.068086][ T9063] loop3: detected capacity change from 0 to 128 20:38:20 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc2c45513, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 331.076561][ T9063] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 331.086387][ T9063] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 331.096524][ T9063] FAULT_INJECTION: forcing a failure. [ 331.096524][ T9063] name failslab, interval 1, probability 0, space 0, times 0 [ 331.106244][ T9063] CPU: 0 PID: 9063 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 331.115765][ T9063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 331.123119][ T9063] Call Trace: [ 331.125878][ T9063] [ 331.128142][ T9063] dump_stack_lvl+0xd1/0x138 [ 331.132140][ T9063] should_fail_ex.cold+0x5/0xa [ 331.136113][ T9063] should_failslab+0x9/0x20 [ 331.140147][ T9063] __kmem_cache_alloc_node+0x5b/0x430 [ 331.144471][ T9063] ? tomoyo_realpath_from_path+0xc3/0x600 [ 331.148947][ T9063] ? tomoyo_realpath_from_path+0xc3/0x600 [ 331.153318][ T9063] __kmalloc+0x4a/0xd0 [ 331.156249][ T9063] tomoyo_realpath_from_path+0xc3/0x600 [ 331.160569][ T9063] ? tomoyo_fill_path_info+0x22d/0x420 [ 331.165086][ T9063] tomoyo_path2_perm+0x33b/0x6e0 20:38:20 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5460, 0x0) [ 331.168802][ T9063] ? tomoyo_mkdev_perm+0x530/0x530 [ 331.173299][ T9063] ? do_raw_spin_lock+0x124/0x2b0 [ 331.176939][ T9063] ? udf_lookup+0xdd/0x270 [ 331.180015][ T9063] ? hook_file_open+0x9c0/0x9c0 [ 331.183922][ T9063] tomoyo_path_rename+0x102/0x1b0 [ 331.187688][ T9063] ? tomoyo_sb_pivotroot+0x30/0x30 [ 331.191507][ T9063] ? do_raw_spin_unlock+0x175/0x230 [ 331.194616][ T9063] ? _raw_spin_unlock+0x28/0x40 [ 331.198831][ T9063] security_path_rename+0x121/0x230 [ 331.203716][ T9063] do_renameat2+0x476/0xc30 [ 331.207660][ T9063] ? __ia32_sys_link+0xa0/0xa0 [ 331.211690][ T9063] ? __virt_addr_valid+0x61/0x2e0 [ 331.216108][ T9063] ? __phys_addr_symbol+0x30/0x70 [ 331.219689][ T9063] ? strncpy_from_user+0x28b/0x3c0 [ 331.223859][ T9063] ? getname_flags.part.0+0x1dd/0x4f0 [ 331.228216][ T9063] __ia32_sys_rename+0x80/0xa0 [ 331.232511][ T9063] __do_fast_syscall_32+0x65/0xf0 [ 331.236965][ T9063] do_fast_syscall_32+0x33/0x70 [ 331.241449][ T9063] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 331.248975][ T9063] RIP: 0023:0xf7f3f549 [ 331.252872][ T9063] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 331.271222][ T9063] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 331.278224][ T9063] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 331.285132][ T9063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 331.293934][ T9063] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 331.302091][ T9063] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 331.309355][ T9063] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 331.317373][ T9063] [ 331.354864][ T9063] ERROR: Out of memory at tomoyo_realpath_from_path. 20:38:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000c00)={0x20, 0xd, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) 20:38:20 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:20 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc2c85512, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:20 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 17) [ 331.461675][ T9073] loop3: detected capacity change from 0 to 128 [ 331.479126][ T9073] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:20 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5bd4ced6edccb3b26834508cabb26bec9b6e6949ec203f52ac85e4ef2559d851a88a3fa56ba9f90a7a7476937417d4681ccd1ac7d80554b3e464e1ee763a9c8"}, 0x48, 0xfffffffffffffffc) [ 331.499241][ T9073] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:20 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc2c85513, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 331.512137][ T9073] FAULT_INJECTION: forcing a failure. [ 331.512137][ T9073] name failslab, interval 1, probability 0, space 0, times 0 20:38:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000780)='maps\x00') ioctl$FIONREAD(r0, 0x541b, &(0x7f00000001c0)) [ 331.586739][ T9073] CPU: 2 PID: 9073 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 331.598193][ T9073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 331.605811][ T9073] Call Trace: [ 331.610428][ T9073] [ 331.614507][ T9073] dump_stack_lvl+0xd1/0x138 [ 331.619291][ T9073] should_fail_ex.cold+0x5/0xa [ 331.624174][ T9073] should_failslab+0x9/0x20 [ 331.628131][ T9073] __kmem_cache_alloc_node+0x5b/0x430 [ 331.634806][ T9073] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 331.639000][ T9073] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 331.645200][ T9073] __kmalloc+0x4a/0xd0 [ 331.649858][ T9073] tomoyo_encode2.part.0+0xe9/0x3a0 [ 331.656601][ T9073] ? rcu_read_lock_sched_held+0x3e/0x70 [ 331.665560][ T9073] tomoyo_encode+0x2c/0x50 [ 331.670247][ T9073] tomoyo_realpath_from_path+0x185/0x600 [ 331.676797][ T9073] tomoyo_path2_perm+0x33b/0x6e0 [ 331.682354][ T9073] ? tomoyo_mkdev_perm+0x530/0x530 [ 331.688161][ T9073] ? do_raw_spin_lock+0x124/0x2b0 [ 331.695027][ T9073] ? udf_lookup+0xdd/0x270 [ 331.699328][ T9073] ? hook_file_open+0x9c0/0x9c0 [ 331.706232][ T9073] tomoyo_path_rename+0x102/0x1b0 [ 331.713670][ T9073] ? tomoyo_sb_pivotroot+0x30/0x30 [ 331.720089][ T9073] ? do_raw_spin_unlock+0x175/0x230 [ 331.726658][ T9073] ? _raw_spin_unlock+0x28/0x40 [ 331.734936][ T9073] security_path_rename+0x121/0x230 [ 331.740862][ T9073] do_renameat2+0x476/0xc30 [ 331.748683][ T9073] ? __ia32_sys_link+0xa0/0xa0 [ 331.755111][ T9073] ? __virt_addr_valid+0x61/0x2e0 [ 331.759969][ T9073] ? __phys_addr_symbol+0x30/0x70 [ 331.765442][ T9073] ? strncpy_from_user+0x28b/0x3c0 [ 331.770213][ T9073] ? getname_flags.part.0+0x1dd/0x4f0 [ 331.775964][ T9073] __ia32_sys_rename+0x80/0xa0 [ 331.780451][ T9073] __do_fast_syscall_32+0x65/0xf0 [ 331.785835][ T9073] do_fast_syscall_32+0x33/0x70 [ 331.791003][ T9073] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 331.796800][ T9073] RIP: 0023:0xf7f3f549 [ 331.801793][ T9073] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 331.825615][ T9073] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 331.834875][ T9073] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 331.842596][ T9073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 331.849930][ T9073] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 331.860633][ T9073] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 331.870690][ T9073] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 331.881428][ T9073] [ 331.894611][ T9073] ERROR: Out of memory at tomoyo_realpath_from_path. 20:38:21 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 18) 20:38:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername(r0, 0x0, &(0x7f0000000080)) 20:38:21 executing program 2: r0 = syz_clone(0x0, &(0x7f0000001240), 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.055709][ T9086] loop3: detected capacity change from 0 to 128 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x1012, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:21 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5421, 0x0) 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.079914][ T9086] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 20:38:21 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x2, 0x0) [ 332.092305][ T9086] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x2, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.138519][ T9086] FAULT_INJECTION: forcing a failure. [ 332.138519][ T9086] name failslab, interval 1, probability 0, space 0, times 0 20:38:21 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8981, 0x0) [ 332.193500][ T9086] CPU: 3 PID: 9086 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 332.205104][ T9086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 332.213822][ T9086] Call Trace: [ 332.216736][ T9086] [ 332.219881][ T9086] dump_stack_lvl+0xd1/0x138 [ 332.225111][ T9086] should_fail_ex.cold+0x5/0xa [ 332.231038][ T9086] should_failslab+0x9/0x20 [ 332.235288][ T9086] __kmem_cache_alloc_node+0x5b/0x430 [ 332.239948][ T9086] ? udf_find_entry+0x539/0x1230 [ 332.243597][ T9086] ? lock_chain_count+0x20/0x20 [ 332.247723][ T9086] kmalloc_trace+0x26/0x60 [ 332.250721][ T9086] udf_find_entry+0x539/0x1230 [ 332.256626][ T9086] ? lock_chain_count+0x20/0x20 [ 332.261170][ T9086] ? mark_held_locks+0x9f/0xe0 [ 332.270234][ T9086] ? lock_chain_count+0x20/0x20 [ 332.275376][ T9086] ? empty_dir+0x840/0x840 [ 332.279845][ T9086] ? find_held_lock+0x2d/0x110 [ 332.283578][ T9086] ? __lock_acquire+0x166e/0x56d0 [ 332.288280][ T9086] udf_rename+0x156/0x1260 [ 332.292225][ T9086] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 332.297900][ T9086] ? userns_owner+0x40/0x40 [ 332.302994][ T9086] ? udf_unlink+0x480/0x480 [ 332.306893][ T9086] ? find_held_lock+0x2d/0x110 [ 332.310817][ T9086] ? vfs_rename+0x49f/0x1a90 [ 332.314938][ T9086] ? lock_downgrade+0x6e0/0x6e0 [ 332.320952][ T9086] ? do_raw_spin_lock+0x124/0x2b0 [ 332.325910][ T9086] ? rwlock_bug.part.0+0x90/0x90 [ 332.330928][ T9086] ? udf_unlink+0x480/0x480 [ 332.335700][ T9086] vfs_rename+0x1162/0x1a90 [ 332.340182][ T9086] ? path_openat+0x2a50/0x2a50 [ 332.343658][ T9086] ? do_raw_spin_unlock+0x175/0x230 [ 332.347565][ T9086] ? _raw_spin_unlock+0x28/0x40 [ 332.352519][ T9086] ? bpf_lsm_path_rename+0x9/0x10 [ 332.358225][ T9086] ? security_path_rename+0x158/0x230 [ 332.364102][ T9086] do_renameat2+0xb22/0xc30 [ 332.367853][ T9086] ? __ia32_sys_link+0xa0/0xa0 [ 332.372185][ T9086] ? __virt_addr_valid+0x61/0x2e0 [ 332.376832][ T9086] ? __phys_addr_symbol+0x30/0x70 [ 332.380593][ T9086] ? strncpy_from_user+0x28b/0x3c0 [ 332.384992][ T9086] __ia32_sys_rename+0x80/0xa0 [ 332.390241][ T9086] __do_fast_syscall_32+0x65/0xf0 [ 332.395131][ T9086] do_fast_syscall_32+0x33/0x70 [ 332.398871][ T9086] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 332.404149][ T9086] RIP: 0023:0xf7f3f549 [ 332.408710][ T9086] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 332.428026][ T9086] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 332.435844][ T9086] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 332.443256][ T9086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 332.449561][ T9086] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 332.455729][ T9086] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 332.462763][ T9086] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 332.468838][ T9086] 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x3, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0xffffffffffffffcc}}, 0x0) 20:38:21 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 19) 20:38:21 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x4, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.615578][ T9108] loop3: detected capacity change from 0 to 128 20:38:21 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) [ 332.629972][ T9108] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 332.642128][ T9108] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 332.667293][ T9108] FAULT_INJECTION: forcing a failure. [ 332.667293][ T9108] name failslab, interval 1, probability 0, space 0, times 0 [ 332.681642][ T9108] CPU: 1 PID: 9108 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 332.690583][ T9108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 332.698184][ T9108] Call Trace: [ 332.700408][ T9108] [ 332.702146][ T9108] dump_stack_lvl+0xd1/0x138 [ 332.704980][ T9108] should_fail_ex.cold+0x5/0xa [ 332.707827][ T9108] should_failslab+0x9/0x20 [ 332.710482][ T9108] __kmem_cache_alloc_node+0x5b/0x430 [ 332.713627][ T9108] ? udf_find_entry+0x539/0x1230 [ 332.716934][ T9108] kmalloc_trace+0x26/0x60 [ 332.719998][ T9108] udf_find_entry+0x539/0x1230 [ 332.723556][ T9108] ? empty_dir+0x840/0x840 [ 332.727324][ T9108] ? find_held_lock+0x2d/0x110 [ 332.731235][ T9108] ? __lock_acquire+0x166e/0x56d0 [ 332.735959][ T9108] udf_rename+0x2f5/0x1260 [ 332.739640][ T9108] ? userns_owner+0x40/0x40 [ 332.743822][ T9108] ? udf_unlink+0x480/0x480 [ 332.747124][ T9108] ? find_held_lock+0x2d/0x110 [ 332.750571][ T9108] ? vfs_rename+0x49f/0x1a90 [ 332.754603][ T9108] ? lock_downgrade+0x6e0/0x6e0 [ 332.760103][ T9108] ? do_raw_spin_lock+0x124/0x2b0 [ 332.769199][ T9108] ? rwlock_bug.part.0+0x90/0x90 [ 332.774195][ T9108] ? udf_unlink+0x480/0x480 [ 332.780104][ T9108] vfs_rename+0x1162/0x1a90 [ 332.783984][ T9108] ? path_openat+0x2a50/0x2a50 [ 332.787331][ T9108] ? do_raw_spin_unlock+0x175/0x230 [ 332.794282][ T9108] ? _raw_spin_unlock+0x28/0x40 [ 332.799393][ T9108] ? bpf_lsm_path_rename+0x9/0x10 [ 332.805880][ T9108] ? security_path_rename+0x158/0x230 20:38:21 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x5, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:21 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000023c0)) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.814456][ T9108] do_renameat2+0xb22/0xc30 [ 332.819755][ T9108] ? __ia32_sys_link+0xa0/0xa0 [ 332.827365][ T9108] ? __virt_addr_valid+0x61/0x2e0 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x6, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.832270][ T9108] ? __phys_addr_symbol+0x30/0x70 [ 332.837126][ T9108] ? strncpy_from_user+0x28b/0x3c0 [ 332.841689][ T9108] __ia32_sys_rename+0x80/0xa0 [ 332.848530][ T9108] __do_fast_syscall_32+0x65/0xf0 [ 332.854726][ T9108] do_fast_syscall_32+0x33/0x70 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x7, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 332.860393][ T9108] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 332.869739][ T9108] RIP: 0023:0xf7f3f549 [ 332.872874][ T9108] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 332.888999][ T9108] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 332.897169][ T9108] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 332.904822][ T9108] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 332.911378][ T9108] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 332.918141][ T9108] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 332.925582][ T9108] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 332.933861][ T9108] 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0xc, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$eJzs20tsG1UXwPFzPLbruPk+nDSkLaqKJZAILU2TOKStgoTyIAKpbSBpQFQ8FGInmDhxFKeQVC3NEtix6JIlWxasEFtUiSVigYJQd6UbNl5RdkV3PC+7eTgk8TTN/1e1d2Z87N57j8f3XCsRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgMvjaQFe3ht0LAADQSJfHx7oyrP8AABwoV9j/AwAAHCQqlvwhKmdmy3rJPq9IXMzPX1ueGB5Z/2lNKioRsex48zfR3ZPpfbnv3Hm33fz5u+24jI5fGUgPFecWFnOlUi6bnpjPTxWzubpfYafPr3XKnoD03Oy17PR0Kd3Tmal6eDl1/9Dh9lR/3/tDcTd2YnhkZDwQE4395//9ERtV+HGx5EVR+eSH7/SyiERk53OxxXtnrzXZgzhlD2JieMQeSCE/Ob9kHtSIExWpnpO4O0cNyMWORERMvzS+O3u2mFjyo6gMni3rqIhY7jyctr8Yrqs/YYiarauIdMg+yNlj7JBY8qGo3DmbkjedebXzHxe5EXbnsOeizv1f1LK+ZX8emPvJfGxefDv9xvx0MRCrEeeO2u/rQyM95p9NCbFk1L7jyzoWdmfQcE1iyZyoxL/+1K4rxK5Ln+o/d/LZC8EK4+gWr2NiO52bq541OeaUDhoxf3Z/XKhPQi35U1Qe/J6wzzvcNUBk9WG4XUMjqCUFUfnnZlm1Zl9qBfb3nv2+9u9t/5sSQ8WFlcX8zMdL6z6eTAx8VFpanJxa/+HK3tUKXtlqH1srsr0tWVIrO74vPit7z3P2AP+rnPm9+faG/17oqGldwfdPPcd172K3UUeZPqlack9Upj84VllnJLntuTkITP5HRKVU/kXdTDv5j1bOAvl/xZ+/hFa3Hju3/698r+XWEsevtm10fS/yb/pk8v+uqAz+fcz5TqOSf6sm1sS1i8p7t084cZG4iYu6w6m84nS+kOsysQ9FpfVnN1bs2KQTe8SP7TaxJVH58k517GEnts2P7TGxa6Jy97f1Y5/2YzMmdsXk627ajU2a2JNObLsf2zlVLGS3mlaT/x5ReefW6+qOecP8B+7/1ZrW80jONz/erfynAtdWnbxedfIf3SL/X4nKyl8n3HHbc+++rVrsf/38m1r5+9vVse6GstWP7a53WGEz+W8RlfuvrnljdsbmnPoZCub/mWh1681rSPlvCVxLOf2Kb3MuDqLSyvXZyUIht8gBBxxw4B2E/cmERjDr/5hZ1fssdesYZ/1vrpz5FdODz/31v7+m9YS0/rcGrvU7VUssKpJYmluIHRVJlFaun8nPTc7kZnLzmd6+rp4LvV2Z87G4W9z5R3XP3ZPA5P+0qNz86VdvH1Nd/61f/ydrWk9I+T8SHFNVXVP3VBxIJv/NotJ3b83bb25W/7v7/47nqlvv/gsp/22BaymnX83bnAsAAAAAAAAAAAAAAAAA2E+SasnzorI89pK6v0NUz8//ZWtaT0g//9UeuJZt0O811D3JAAAAAAAAAAAADRQRS74RlRekrLfMhWaRS8EWT7R/AwAA///zSUb4") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 20) 20:38:22 executing program 1: syz_clone3(&(0x7f0000001240)={0x40000000, 0x0, 0x0, 0x0, {0x40}, &(0x7f0000000140)=""/228, 0xe4, &(0x7f0000000240)=""/4096, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) 20:38:22 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x12, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 333.053063][ T9133] loop3: detected capacity change from 0 to 128 [ 333.074513][ T9133] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 333.103179][ T9133] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 333.131954][ T9133] FAULT_INJECTION: forcing a failure. [ 333.131954][ T9133] name failslab, interval 1, probability 0, space 0, times 0 [ 333.147583][ T9133] CPU: 0 PID: 9133 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 333.158409][ T9133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 333.166515][ T9133] Call Trace: [ 333.169692][ T9133] [ 333.172537][ T9133] dump_stack_lvl+0xd1/0x138 [ 333.177905][ T9133] should_fail_ex.cold+0x5/0xa [ 333.182456][ T9133] should_failslab+0x9/0x20 [ 333.186160][ T9133] __kmem_cache_alloc_node+0x5b/0x430 [ 333.191249][ T9133] ? udf_add_entry+0x20a/0x2ac0 [ 333.194772][ T9133] kmalloc_trace+0x26/0x60 [ 333.198646][ T9133] udf_add_entry+0x20a/0x2ac0 [ 333.202062][ T9133] ? udf_write_fi+0xf20/0xf20 [ 333.206611][ T9133] ? find_held_lock+0x2d/0x110 [ 333.210139][ T9133] ? __lock_acquire+0x166e/0x56d0 [ 333.216086][ T9133] udf_rename+0x121f/0x1260 [ 333.220426][ T9133] ? udf_unlink+0x480/0x480 [ 333.225668][ T9133] ? find_held_lock+0x2d/0x110 [ 333.230256][ T9133] ? vfs_rename+0x49f/0x1a90 [ 333.234603][ T9133] ? lock_downgrade+0x6e0/0x6e0 [ 333.240089][ T9133] ? do_raw_spin_lock+0x124/0x2b0 [ 333.247978][ T9133] ? udf_unlink+0x480/0x480 [ 333.252810][ T9133] vfs_rename+0x1162/0x1a90 [ 333.257378][ T9133] ? path_openat+0x2a50/0x2a50 [ 333.263568][ T9133] ? do_raw_spin_unlock+0x175/0x230 [ 333.267818][ T9133] ? _raw_spin_unlock+0x28/0x40 [ 333.273470][ T9133] ? bpf_lsm_path_rename+0x9/0x10 [ 333.279229][ T9133] ? security_path_rename+0x158/0x230 [ 333.285329][ T9133] do_renameat2+0xb22/0xc30 [ 333.289854][ T9133] ? __ia32_sys_link+0xa0/0xa0 [ 333.296265][ T9133] ? __virt_addr_valid+0x61/0x2e0 [ 333.302683][ T9133] ? __phys_addr_symbol+0x30/0x70 [ 333.308063][ T9133] ? strncpy_from_user+0x28b/0x3c0 [ 333.313525][ T9133] __ia32_sys_rename+0x80/0xa0 [ 333.318171][ T9133] __do_fast_syscall_32+0x65/0xf0 [ 333.324031][ T9133] do_fast_syscall_32+0x33/0x70 [ 333.328951][ T9133] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 333.334832][ T9133] RIP: 0023:0xf7f3f549 [ 333.340008][ T9133] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 333.356174][ T9133] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 333.364314][ T9133] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 333.372955][ T9133] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 333.382097][ T9133] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 333.390863][ T9133] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 333.399539][ T9133] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 333.407113][ T9133] 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x18, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 21) 20:38:22 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000000)=0xfff) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r3, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 1: syz_clone3(&(0x7f0000001240)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 333.551900][ T9146] loop3: detected capacity change from 0 to 128 [ 333.561951][ T9146] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 333.612061][ T9146] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x1e, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xfff) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r2, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 1: sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x4000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x24, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 3: syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@uid_ignore}, {@dmode={'dmode', 0x3d, 0x4}}, {@undelete}, {@shortad}]}, 0x4, 0x4a4, &(0x7f0000000a40)="$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") rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (fail_nth: 22) 20:38:22 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) getpgid(0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xfff) r1 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x0, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, r1, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x2a, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:22 executing program 1: syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000059c0)={&(0x7f00000048c0), 0xc, &(0x7f0000005980)={&(0x7f0000004900)={0x1060, 0x0, 0x5, 0x801, 0x0, 0x0, {}, [{{0x254, 0x1, {{0x3, 0x9}, 0x0, 0x63, 0x6, 0x6, 0x18, 'syz1\x00', "2b3a98f960db3e318eac501e5677c0dd521ae989b5069a7d4b5f794eb6352655", "8c1dbe422222392695d86906f8033b5f61a2976e636b0b140ae3f24fc79875dd", [{0x3d, 0x8000, {0x1, 0x6ded}}, {0x0, 0x1, {0x0, 0x80}}, {0x2, 0x7ff, {0x1, 0x9}}, {0x0, 0x6, {0x1, 0x4}}, {0x8, 0x6600, {0x0, 0x5}}, {0x1, 0x5, {0x1, 0x1}}, {0x5, 0x800}, {0xc3bd, 0x5, {0x2, 0x8}}, {0x0, 0x1f, {0x0, 0x1}}, {0x30f7, 0x9, {0x3, 0xffffff08}}, {0x595, 0x8, {0x3, 0x6}}, {0x4, 0x101, {0x3, 0x8}}, {0x4, 0x9, {0x2, 0x8}}, {0x0, 0xe4}, {0x101, 0x9, {0x1, 0x2000400}}, {0x0, 0x80, {0x0, 0x1}}, {0x9, 0x1, {0x0, 0x100}}, {0xffe0, 0x8, {0x0, 0x9}}, {0x401, 0x7, {0x2, 0x1}}, {0xddf2, 0x6, {0x2}}, {0x9, 0x7943, {0x0, 0x80000001}}, {0x0, 0x3}, {0x0, 0x4, {0x0, 0x2}}, {0x9, 0x3, {0x0, 0x3}}, {0xa400, 0x5, {0x0, 0x6}}, {0x0, 0x9, {0x0, 0x4}}, {0x6, 0x1, {0x3}}, {0x200, 0x7, {0x0, 0x1}}, {0xca1d, 0x5, {0x3}}, {0x40, 0x4, {0x2, 0x3}}, {0x100, 0x0, {0x2}}, {0x3, 0x7, {0x3, 0x20}}, {0x9, 0x1, {0x2, 0x6}}, {0xff81, 0x1ff, {0x1, 0x10000}}, {0x100, 0x0, {0x0, 0x4}}, {0x5, 0xe7de, {0x1, 0x6}}, {0x80, 0x7, {0x3}}, {0x401, 0x101, {0x47e35fff4d047a44, 0x619}}, {0x81, 0x1ff, {0x1}}, {0x401, 0x100, {0x2, 0x7dc}}]}}}, {{0x254, 0x1, {{0x1, 0x7}, 0x3, 0x5, 0x401, 0x1, 0x25, 'syz0\x00', "80a1a605504098fcb28b7372ca3031182ce36bbce572468c26a43832e5a922d4", "96f172e109d14cdbe31fcd5e2922c2147742ea8a75e6b7b6a2dcaaa5fb064b7d", [{0x0, 0xff23, {0x2, 0x7}}, {0x6, 0x6f3f, {0x0, 0x2}}, {0xd2, 0x3, {0x2, 0xfffff24e}}, {0x5, 0x6c91, {0x3, 0x7}}, {0xc17, 0x1, {0x1, 0x710}}, {0x0, 0x8, {0x3, 0x175c}}, {0x0, 0x7, {0x1, 0x3}}, {0x11, 0x2f, {0x3}}, {0x7, 0x2, {0x0, 0x6}}, {0xffff, 0x44, {0x3, 0x9}}, {0x7, 0x9, {0x2, 0x8}}, {0x200, 0x969, {0x3, 0xeb6}}, {0x0, 0x3f, {0x2, 0xcf}}, {0x80, 0x1, {0x0, 0x7fffffff}}, {0x1, 0x1, {0x0, 0x8}}, {0x0, 0x6, {0x1}}, {0xab7, 0x0, {0x2, 0xc5}}, {0x1000, 0x4716, {0x0, 0xe9}}, {0x401, 0x8, {0x0, 0x8000000}}, {0x0, 0x2, {0x2, 0x4}}, {0xff8, 0x9, {0x2, 0xea96}}, {0x0, 0x401, {0x1, 0x5}}, {0x2, 0x0, {0x0, 0x1ff}}, {0x7, 0x0, {0x3, 0x8000}}, {0x2, 0x8, {0x2, 0x5}}, {0x5, 0x1, {0x0, 0xa2}}, {0xff, 0x8001, {0x2}}, {0x6, 0xd0b0, {0x0, 0x1}}, {0x3, 0x6, {0x3, 0x6}}, {0x8, 0xfffc, {0x0, 0xff}}, {0xdf, 0xfffa, {0x0, 0x101}}, {0x6, 0x0, {0x1, 0x1}}, {0xa5, 0x81, {0x3, 0x80000000}}, {0x1ff, 0x0, {0x3, 0x3}}, {0x9, 0x4, {0x1, 0x7ff}}, {0x6, 0xfff, {0x0, 0x1}}, {0x3, 0x8001, {0x0, 0x7}}, {0x0, 0x0, {0x2, 0x4}}, {0x0, 0x725}, {0x2, 0x3, {0x2, 0x81}}]}}}, {{0x254, 0x1, {{0x1, 0x80000000}, 0xd0, 0x5, 0x81, 0xefd, 0x4, 'syz1\x00', "89dc77984322324ffd2edbb977622e837c443285c538640438c5ba7fc19cc7ca", "eda0eb2d48e698575bcdf01a6ad788b9eaa2878d5cd53894b57c14238e2f621a", [{0x1, 0x5, {0x1, 0x5}}, {0x20, 0x7e46, {0x1, 0x7}}, {0x7fff, 0x233, {0x3, 0x3}}, {0xff, 0x1ff, {0x0, 0x81}}, {0x6ef, 0x2, {0x1, 0x5}}, {0x81, 0x1, {0x0, 0xfffffbff}}, {0x2, 0x5, {0x0, 0x4}}, {0x6, 0xff, {0x1, 0x33a}}, {0x9cd, 0xea9, {0x0, 0x8}}, {0x40, 0x7, {0x0, 0x7}}, {0x2, 0x1, {0x2, 0xd96d}}, {0x4, 0x2, {0x2, 0x1}}, {0xa3, 0x7f, {0x3, 0x2}}, {0x6, 0x0, {0x3, 0x20}}, {0x7ff, 0x200, {0x2, 0x7}}, {0x3, 0x7ff, {0x2, 0x475}}, {0x6, 0x6}, {0x0, 0x0, {0x2, 0x7}}, {0x6, 0x1, {0x0, 0x1000}}, {0x81, 0x2, {0x0, 0x5}}, {0x3f, 0x0, {0x1e4566e6ee970fb9, 0x65d0ed50}}, {0xc7, 0x8, {0x2, 0x7fff}}, {0x4, 0x5, {0x1, 0x80}}, {0xb74, 0x7, {0x0, 0x80000001}}, {0x2, 0x0, {0x3, 0x4}}, {0x0, 0x800, {0x1, 0x4}}, {0x8, 0x8, {0x0, 0x9}}, {0x1, 0xfffa, {0x2, 0x20}}, {0x1, 0xdb81, {0x2}}, {0xffe0, 0x1, {0x1, 0x80000000}}, {0x0, 0xa8f6, {0x3, 0xf4}}, {0x2, 0x4, {0x2, 0x5}}, {0xbb, 0x84, {0x1, 0x401}}, {0x0, 0x7, {0x0, 0x8001}}, {0x8001, 0x9, {0x0, 0x4}}, {0x401, 0x8, {0x1, 0x4}}, {0x6, 0x5, {0x1, 0xd26}}, {0x62, 0x8, {0x0, 0x8}}, {0x0, 0x6, {0x3, 0x9}}, {0xff, 0x600, {0x1}}]}}}, {{0x254, 0x1, {{0x0, 0x4}, 0x0, 0x7, 0x400, 0x81, 0x5, 'syz0\x00', "cfb5ab7125786d73d8ddd0b2a9256da767f767a72c4bfd139e31133abd319a14", "da3ec2a2a1760fc187c3b8c53102998f90901f8a330d99f5c817dc7062e1883a", [{0x1000, 0xda1}, {0xdf3d, 0x4, {0x0, 0x8001}}, {0x9, 0x0, {0x3, 0x4}}, {0x0, 0x0, {0x2, 0x1}}, {0xe33, 0x1ff, {0x0, 0x7}}, {0x7ff, 0x7, {0x1, 0x6}}, {0x86f, 0x1, {0x1, 0x8eb0}}, {0x1, 0x1, {0x3}}, {0x8, 0x81, {0x3, 0xfffffffa}}, {0x9, 0xd27, {0x2}}, {0xa5, 0x100, {0x1, 0x3}}, {0x0, 0xfbff, {0x1, 0xfb8}}, {0xff80, 0x8, {0x3, 0x101}}, {0x1, 0x2, {0x3, 0x2424}}, {0x7, 0x10b7, {0x0, 0x1}}, {0x81, 0x4, {0x0, 0x5}}, {0x6, 0x20, {0x1}}, {0x6, 0x1, {0x3}}, {0x80, 0x1ff, {0x0, 0x3}}, {0x3, 0x2, {0x2, 0x3ff}}, {0x81, 0x6b7c, {0x1}}, {0x0, 0x5, {0x0, 0x3}}, {0x5, 0xffff, {0x1, 0x7fffffff}}, {0x0, 0x69a, {0x3, 0x8}}, {0x3ff, 0xfff8, {0x1, 0xffffffff}}, {0xfff, 0x0, {0x1, 0x5}}, {0x6}, {0x0, 0x0, {0x0, 0x3}}, {0xab6, 0x200, {0x2, 0x8}}, {0x81, 0x7, {0x0, 0x20}}, {0x24bc, 0xb37, {0x1, 0x4}}, {0x2, 0x80, {0x0, 0x6}}, {0x9, 0xf91, {0x3, 0x7}}, {0x100, 0x0, {0x0, 0x80000001}}, {0xf9, 0x0, {0x2, 0x3}}, {0x40, 0xd1e9, {0x0, 0x7}}, {0x7, 0x0, {0x0, 0x6ad}}, {0x9, 0x8, {0x0, 0x2}}, {0xfffd, 0x2, {0x3, 0xffff}}, {0x6, 0x8, {0x1, 0xee}}]}}}, {{0x254, 0x1, {{0x3, 0x3}, 0x8, 0x8, 0x1ff, 0x0, 0x20, 'syz1\x00', "e6d73f391caa8f65362fa6cdc7fa6b7a551c10b0867a85aa7c87526863b9782f", "91907e567db1beeca13ba928b2ad070c303dc0f681e221da6c7b7a44a3f965ea", [{0xfc, 0xe0, {0x0, 0xfff}}, {0x0, 0x8, {0x1}}, {0x2, 0x3, {0x3, 0xfffffc00}}, {0x0, 0x9, {0x0, 0x1}}, {0x1, 0x9, {0x3, 0x1}}, {0x7, 0x6, {0x2}}, {0x400}, {0x6, 0x7, {0x2, 0x76edfe08}}, {0x7, 0x0, {0x1, 0x1ff}}, {0x7, 0x3f, {0x0, 0x20}}, {0x5, 0x4, {0x1, 0x2}}, {0x892d, 0x0, {0x0, 0x1}}, {0x7, 0x1a2, {0x2, 0x37}}, {0x5, 0x40, {0x0, 0x7}}, {0x3, 0x9, {0x2, 0x401}}, {0x7f, 0xae96, {0x0, 0x401}}, {0x2, 0x1}, {0x6, 0xf8a1, {0x2}}, {0xb59f, 0x0, {0x1, 0x7}}, {0x5, 0x4, {0x2}}, {0x8001, 0x800, {0x3, 0x10000000}}, {0x0, 0x3, {0x2, 0x40}}, {0x0, 0x8, {0x3, 0x5}}, {0x4, 0x0, {0x3, 0x9}}, {0x8, 0xf16, {0x1, 0x3}}, {0x6, 0x1, {0x0, 0x3}}, {0x2, 0xd1, {0x2, 0x7}}, {0xcf83, 0x8, {0x1, 0x1}}, {0x5, 0x400, {0x2, 0xffffffff}}, {0xffff, 0x1, {0x2}}, {0x0, 0x389, {0x0, 0xfff}}, {0x1, 0x0, {0x3, 0x6}}, {0x6, 0x0, {0x2}}, {0x65, 0x0, {0x2, 0x5}}, {0x8, 0x1, {0x3}}, {0x1, 0x8, {0x2, 0x3}}, {0x0, 0x8000, {0x3, 0x9}}, {0xfffc, 0x2, {0x1, 0x3}}, {0x5, 0x0, {0x1, 0x2}}, {0x5, 0x0, {0x0, 0x4}}]}}}, {{0x254, 0x1, {{0x0, 0x7ff}, 0x0, 0x0, 0x10, 0x0, 0x28, 'syz1\x00', "d198a0cc41bd6b4cf3665359a3f5b1c2dd933841986f9638c2831ede5a58d530", "28d16bc16d2f083250f0573f69f0aa89ad664734ed7ee6f76bf3a64a454a530f", [{0x7, 0x5, {0x3}}, {0x1f}, {0x0, 0x0, {0x0, 0xfffffffa}}, {0x0, 0x0, {0x1, 0x7}}, {0x400, 0x2144, {0x0, 0xffff0d9c}}, {0x0, 0x0, {0x2, 0x3}}, {0x4dd0, 0x40, {0x2, 0x5}}, {0xc0, 0x1, {0x0, 0x7ff}}, {0x100, 0x988c, {0x1}}, {0x6, 0x7ff, {0x0, 0xb657}}, {0x1, 0x7094, {0x0, 0x8}}, {0x9, 0x400, {0x1, 0x9}}, {0x0, 0xfff7}, {0xffa8, 0x7f, {0x2, 0x3}}, {0x0, 0xfff7, {0x0, 0x40}}, {0x9, 0x7}, {0x4, 0x0, {0x3, 0x7}}, {0x0, 0x0, {0x3, 0xffff9bfc}}, {0x64, 0xff80, {0x1, 0x3}}, {0x0, 0x8000, {0x1, 0xdbc}}, {0x101, 0xff8a, {0x0, 0xfff}}, {0xd9a, 0xb6, {0x3, 0x2}}, {0xdf, 0x2}, {0x0, 0xde1f, {0x1, 0xfffffff8}}, {0x8001, 0x0, {0x1}}, {0x2abd, 0x3, {0x1, 0x7fffffff}}, {0x1, 0x7fff, {0x0, 0xfffffffd}}, {0x7, 0x725}, {0x4, 0xbaf5, {0x0, 0x2}}, {0x7, 0x1, {0x0, 0x3}}, {0x3, 0x0, {0x3, 0x4}}, {0x77a9, 0x0, {0x3, 0x5}}, {0x6, 0x7, {0x0, 0x5}}, {0x400, 0xffff, {0x0, 0x7fff}}, {0x6, 0x200, {0x3, 0x5}}, {0x8, 0xf509, {0x3, 0x1000}}, {0x0, 0x406, {0x0, 0x5}}, {0x0, 0x0, {0x3}}, {0xf801, 0x8, {0x2, 0x7}}, {0x0, 0xff, {0x1, 0x3}}]}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "88f4558b31e456d1a0c2834f88bddcdcd5a35a411b2916d68f162ef78db2717f", "07e68aa80efc64b335167dd21d10a36294b5c8b1ee6076afa39437dd71daeedb", [{0x3, 0x4, {0x1}}, {0xf000, 0x1, {0x0, 0x9}}, {0x8, 0x7ff, {0x1, 0x799}}, {0x5, 0x1, {0x0, 0x9}}, {0xff, 0x7}, {0x1, 0x8, {0x2, 0x6}}, {0x1f, 0x1ff, {0x3, 0x2}}, {0x5, 0x3f, {0x7, 0x20}}, {0x4, 0x0, {0x0, 0xfffffff9}}, {0x0, 0x1, {0x1}}, {0x3e6c, 0x0, {0x1}}, {0x7f, 0x0, {0x2, 0xc41593b}}, {0x5, 0x5, {0x3, 0x9}}, {0x0, 0x4d, {0x3, 0x20}}, {0x9, 0x0, {0x3, 0x20}}, {0x7, 0x6, {0x3, 0x39}}, {0x5, 0x22, {0x0, 0xd65}}, {0xfff, 0xff00, {0x2, 0x15}}, {0x9813, 0xff}, {0x0, 0x9, {0x2}}, {0x23, 0x1ff, {0x1, 0x601f}}, {0x9}, {0x0, 0x7fff, {0x1, 0x7}}, {0xff, 0xfe00}, {0x0, 0x0, {0x1}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x4000011}, 0x4840) [ 333.795326][ T9162] loop3: detected capacity change from 0 to 128 [ 333.806710][ T9162] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 333.818456][ T9162] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 20:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f0000002680)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 333.856261][ T9162] FAULT_INJECTION: forcing a failure. [ 333.856261][ T9162] name failslab, interval 1, probability 0, space 0, times 0 20:38:23 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x30, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 333.872453][ T9162] CPU: 2 PID: 9162 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 333.883067][ T9162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 333.889946][ T9162] Call Trace: [ 333.893362][ T9162] [ 333.896235][ T9162] dump_stack_lvl+0xd1/0x138 [ 333.901701][ T9162] should_fail_ex.cold+0x5/0xa [ 333.905396][ T9162] should_failslab+0x9/0x20 [ 333.909314][ T9162] __kmem_cache_alloc_node+0x5b/0x430 [ 333.914202][ T9162] ? udf_find_entry+0x539/0x1230 [ 333.919786][ T9162] ? __bread_gfp+0x81/0x330 [ 333.925276][ T9162] kmalloc_trace+0x26/0x60 20:38:23 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x100c, 0x36, 0x0, 0x5, 'syz0\x00', 0x1}, 0x5, 0x40, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:38:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}], {0x14}}, 0x88}}, 0x0) [ 333.930190][ T9162] udf_find_entry+0x539/0x1230 [ 333.937589][ T9162] ? empty_dir+0x840/0x840 [ 333.942583][ T9162] ? simple_setattr+0x110/0x110 [ 333.948592][ T9162] ? mark_buffer_dirty+0x160/0xa40 [ 333.953474][ T9162] ? mark_buffer_dirty_inode+0xd1/0x3d0 [ 333.959757][ T9162] udf_rename+0xd6a/0x1260 [ 333.965556][ T9162] ? udf_unlink+0x480/0x480 [ 333.970622][ T9162] ? find_held_lock+0x2d/0x110 [ 333.977206][ T9162] ? vfs_rename+0x49f/0x1a90 [ 333.981951][ T9162] ? lock_downgrade+0x6e0/0x6e0 [ 333.985877][ T9162] ? do_raw_spin_lock+0x124/0x2b0 [ 333.991818][ T9162] ? udf_unlink+0x480/0x480 [ 333.999023][ T9162] vfs_rename+0x1162/0x1a90 [ 334.002638][ T9162] ? path_openat+0x2a50/0x2a50 [ 334.006241][ T9162] ? do_raw_spin_unlock+0x175/0x230 [ 334.010602][ T9162] ? _raw_spin_unlock+0x28/0x40 [ 334.014512][ T9162] ? bpf_lsm_path_rename+0x9/0x10 [ 334.018473][ T9162] ? security_path_rename+0x158/0x230 [ 334.023757][ T9162] do_renameat2+0xb22/0xc30 [ 334.027497][ T9162] ? __ia32_sys_link+0xa0/0xa0 [ 334.031536][ T9162] ? __virt_addr_valid+0x61/0x2e0 [ 334.036659][ T9162] ? __phys_addr_symbol+0x30/0x70 [ 334.041258][ T9162] ? strncpy_from_user+0x28b/0x3c0 [ 334.045420][ T9162] __ia32_sys_rename+0x80/0xa0 [ 334.049529][ T9162] __do_fast_syscall_32+0x65/0xf0 [ 334.053431][ T9162] do_fast_syscall_32+0x33/0x70 [ 334.056823][ T9162] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 334.061613][ T9162] RIP: 0023:0xf7f3f549 [ 334.064550][ T9162] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 334.077783][ T9162] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 334.084505][ T9162] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 334.089259][ T9162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 334.095502][ T9162] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 334.102842][ T9162] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 334.109130][ T9162] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 334.115787][ T9162] [ 334.123183][ T9162] ================================================================== [ 334.130781][ T9162] BUG: KASAN: out-of-bounds in udf_write_fi+0x914/0xf20 [ 334.136694][ T9162] Write of size 18446744073709551572 at addr ffff888077c1562c by task syz-executor.3/9162 [ 334.145641][ T9162] [ 334.147679][ T9162] CPU: 3 PID: 9162 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 334.164222][ T9162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 334.173566][ T9162] Call Trace: [ 334.175959][ T9162] [ 334.178208][ T9162] dump_stack_lvl+0xd1/0x138 [ 334.181650][ T9162] print_report+0x15e/0x45d [ 334.185189][ T9162] ? __phys_addr+0xc8/0x140 [ 334.188565][ T9162] ? udf_write_fi+0x914/0xf20 [ 334.191891][ T9162] kasan_report+0xbf/0x1f0 [ 334.194989][ T9162] ? udf_write_fi+0x914/0xf20 [ 334.199385][ T9162] kasan_check_range+0x141/0x190 [ 334.203086][ T9162] memset+0x24/0x50 [ 334.205705][ T9162] udf_write_fi+0x914/0xf20 [ 334.209398][ T9162] ? udf_delete_entry+0xf8/0x150 [ 334.213139][ T9162] udf_rename+0xd80/0x1260 [ 334.216541][ T9162] ? udf_unlink+0x480/0x480 [ 334.219881][ T9162] ? find_held_lock+0x2d/0x110 [ 334.223260][ T9162] ? vfs_rename+0x49f/0x1a90 [ 334.226324][ T9162] ? lock_downgrade+0x6e0/0x6e0 [ 334.229950][ T9162] ? do_raw_spin_lock+0x124/0x2b0 [ 334.235099][ T9162] ? udf_unlink+0x480/0x480 [ 334.240051][ T9162] vfs_rename+0x1162/0x1a90 [ 334.244456][ T9162] ? path_openat+0x2a50/0x2a50 [ 334.248834][ T9162] ? do_raw_spin_unlock+0x175/0x230 [ 334.253850][ T9162] ? _raw_spin_unlock+0x28/0x40 [ 334.259265][ T9162] ? bpf_lsm_path_rename+0x9/0x10 [ 334.266056][ T9162] ? security_path_rename+0x158/0x230 [ 334.271851][ T9162] do_renameat2+0xb22/0xc30 [ 334.276706][ T9162] ? __ia32_sys_link+0xa0/0xa0 [ 334.281888][ T9162] ? __virt_addr_valid+0x61/0x2e0 [ 334.287298][ T9162] ? __phys_addr_symbol+0x30/0x70 [ 334.294247][ T9162] ? strncpy_from_user+0x28b/0x3c0 [ 334.300770][ T9162] __ia32_sys_rename+0x80/0xa0 [ 334.306343][ T9162] __do_fast_syscall_32+0x65/0xf0 [ 334.311914][ T9162] do_fast_syscall_32+0x33/0x70 [ 334.318985][ T9162] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 334.325734][ T9162] RIP: 0023:0xf7f3f549 [ 334.329385][ T9162] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 334.342928][ T9162] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 334.348312][ T9162] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 334.353208][ T9162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 334.358498][ T9162] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 334.364249][ T9162] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 334.369785][ T9162] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 334.375119][ T9162] [ 334.377097][ T9162] [ 334.378753][ T9162] The buggy address belongs to the physical page: [ 334.383551][ T9162] page:ffffea0001df0540 refcount:3 mapcount:0 mapping:ffff88801967dff8 index:0xe pfn:0x77c15 [ 334.391143][ T9162] memcg:ffff8880267a4000 [ 334.394106][ T9162] aops:def_blk_aops ino:700003 [ 334.398455][ T9162] flags: 0x4fff0000000202a(referenced|dirty|active|private|node=1|zone=1|lastcpupid=0x7ff) [ 334.405319][ T9162] raw: 04fff0000000202a 0000000000000000 dead000000000122 ffff88801967dff8 [ 334.410786][ T9162] raw: 000000000000000e ffff8880451d1ae0 00000003ffffffff ffff8880267a4000 [ 334.417233][ T9162] page dumped because: kasan: bad access detected [ 334.422828][ T9162] page_owner tracks the page as allocated [ 334.427665][ T9162] page last allocated via order 0, migratetype Movable, gfp_mask 0x148c48(GFP_NOFS|__GFP_NOFAIL|__GFP_COMP|__GFP_HARDWALL|__GFP_MOVABLE), pid 9162, tgid 9161 (syz-executor.3), ts 333855889494, free_ts 333745911140 [ 334.442661][ T9162] get_page_from_freelist+0x119c/0x2ce0 [ 334.447673][ T9162] __alloc_pages_slowpath.constprop.0+0x36b/0x23d0 [ 334.452644][ T9162] __alloc_pages+0x4aa/0x5b0 [ 334.456663][ T9162] alloc_pages+0x1aa/0x270 [ 334.460272][ T9162] folio_alloc+0x20/0x70 [ 334.463526][ T9162] filemap_alloc_folio+0x362/0x450 [ 334.467482][ T9162] __filemap_get_folio+0x32c/0xd80 [ 334.471930][ T9162] pagecache_get_page+0x2e/0x280 [ 334.475564][ T9162] __getblk_slow+0x1f4/0x1030 [ 334.479510][ T9162] __getblk_gfp+0x72/0x80 [ 334.482514][ T9162] udf_tgetblk+0xfd/0x1d0 [ 334.485889][ T9162] udf_expand_dir_adinicb+0x399/0xf20 [ 334.490335][ T9162] udf_add_entry+0x1ea8/0x2ac0 [ 334.494488][ T9162] udf_rename+0x121f/0x1260 [ 334.497646][ T9162] vfs_rename+0x1162/0x1a90 [ 334.501173][ T9162] do_renameat2+0xb22/0xc30 [ 334.504740][ T9162] page last free stack trace: [ 334.509509][ T9162] free_pcp_prepare+0x65c/0xc00 [ 334.513455][ T9162] free_unref_page_list+0x176/0xcd0 [ 334.517307][ T9162] release_pages+0xcb1/0x1330 [ 334.521621][ T9162] __pagevec_release+0x77/0xe0 [ 334.526057][ T9162] shmem_undo_range+0x595/0x1340 [ 334.530625][ T9162] shmem_evict_inode+0x32f/0xb60 [ 334.534536][ T9162] evict+0x2ed/0x6b0 [ 334.537711][ T9162] iput.part.0+0x59b/0x880 [ 334.541638][ T9162] iput+0x5c/0x80 [ 334.544511][ T9162] dentry_unlink_inode+0x2b1/0x460 [ 334.548038][ T9162] __dentry_kill+0x3c0/0x640 [ 334.551770][ T9162] dput+0x80a/0xdb0 [ 334.554458][ T9162] __fput+0x3cc/0xa90 [ 334.557596][ T9162] task_work_run+0x16f/0x270 [ 334.561397][ T9162] exit_to_user_mode_prepare+0x23c/0x250 [ 334.565679][ T9162] syscall_exit_to_user_mode+0x1d/0x50 [ 334.569432][ T9162] [ 334.571243][ T9162] Memory state around the buggy address: [ 334.575734][ T9162] ffff888077c15500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 334.581311][ T9162] ffff888077c15580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 334.586799][ T9162] >ffff888077c15600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 334.592226][ T9162] ^ [ 334.595746][ T9162] ffff888077c15680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 334.601403][ T9162] ffff888077c15700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 334.608430][ T9162] ================================================================== [ 334.619783][ T9162] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 334.625283][ T9162] CPU: 3 PID: 9162 Comm: syz-executor.3 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c #0 [ 334.632239][ T9162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 334.638736][ T9162] Call Trace: [ 334.641252][ T9162] [ 334.643558][ T9162] dump_stack_lvl+0xd1/0x138 [ 334.646899][ T9162] panic+0x2cc/0x626 [ 334.649871][ T9162] ? panic_print_sys_info.part.0+0x110/0x110 [ 334.655182][ T9162] ? preempt_schedule_thunk+0x1a/0x20 [ 334.659246][ T9162] ? preempt_schedule_common+0x59/0xc0 [ 334.663204][ T9162] check_panic_on_warn.cold+0x19/0x35 [ 334.667063][ T9162] end_report.part.0+0x36/0x73 [ 334.670430][ T9162] ? udf_write_fi+0x914/0xf20 [ 334.673278][ T9162] kasan_report.cold+0xa/0xf [ 334.676765][ T9162] ? udf_write_fi+0x914/0xf20 [ 334.679998][ T9162] kasan_check_range+0x141/0x190 [ 334.683792][ T9162] memset+0x24/0x50 [ 334.687099][ T9162] udf_write_fi+0x914/0xf20 [ 334.690546][ T9162] ? udf_delete_entry+0xf8/0x150 [ 334.693689][ T9162] udf_rename+0xd80/0x1260 [ 334.697007][ T9162] ? udf_unlink+0x480/0x480 [ 334.700301][ T9162] ? find_held_lock+0x2d/0x110 [ 334.704198][ T9162] ? vfs_rename+0x49f/0x1a90 [ 334.707386][ T9162] ? lock_downgrade+0x6e0/0x6e0 [ 334.711185][ T9162] ? do_raw_spin_lock+0x124/0x2b0 [ 334.716475][ T9162] ? udf_unlink+0x480/0x480 [ 334.721064][ T9162] vfs_rename+0x1162/0x1a90 [ 334.724863][ T9162] ? path_openat+0x2a50/0x2a50 [ 334.729388][ T9162] ? do_raw_spin_unlock+0x175/0x230 [ 334.734303][ T9162] ? _raw_spin_unlock+0x28/0x40 [ 334.738718][ T9162] ? bpf_lsm_path_rename+0x9/0x10 [ 334.743243][ T9162] ? security_path_rename+0x158/0x230 [ 334.747691][ T9162] do_renameat2+0xb22/0xc30 [ 334.751947][ T9162] ? __ia32_sys_link+0xa0/0xa0 [ 334.756802][ T9162] ? __virt_addr_valid+0x61/0x2e0 [ 334.761236][ T9162] ? __phys_addr_symbol+0x30/0x70 [ 334.765586][ T9162] ? strncpy_from_user+0x28b/0x3c0 [ 334.770133][ T9162] __ia32_sys_rename+0x80/0xa0 [ 334.774053][ T9162] __do_fast_syscall_32+0x65/0xf0 [ 334.778088][ T9162] do_fast_syscall_32+0x33/0x70 [ 334.782042][ T9162] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 334.787083][ T9162] RIP: 0023:0xf7f3f549 [ 334.790219][ T9162] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 334.804941][ T9162] RSP: 002b:00000000f7f3a5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000026 [ 334.810875][ T9162] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000020000100 [ 334.817100][ T9162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 334.823098][ T9162] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 334.828559][ T9162] R10: 0000000000000000 R11: 0000000000000282 R12: 0000000000000000 [ 334.834165][ T9162] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 334.840596][ T9162] [ 334.844291][ T9162] Kernel Offset: disabled [ 334.847464][ T9162] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:38:23 Registers: info registers vcpu 0 RAX=0000000080000000 RBX=00000000000000af RCX=0000000000000000 RDX=ffff88801c57ba80 RSI=ffffffff83ca26e9 RDI=0000000000000001 RBP=dffffc0000000000 RSP=ffffc90002d77598 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000000 R11=0000000000094001 R12=ffffc90002d77660 R13=ffff88801b3b7600 R14=ffff88801b3b7630 R15=00000000000000b0 RIP=ffffffff81816210 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 000fffff 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 000fffff 00000000 FS =0000 00007fe74db15840 000fffff 00000000 GS =0000 ffff88802c600000 000fffff 00000000 LDT=0000 0000000000000000 000fffff 00000000 TR =0040 fffffe78b7dc3000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe78b7dc1000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020000080 CR3=000000004b4c4000 CR4=00150ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=622f617461642f766564752f6e75722f XMM02=00000000000000000000000000000000 XMM03=00ff00000000ff00000000ff000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=ffff000000000000ffff000000000000 XMM06=ffff0000ff0000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=7461657263206f742064656c69614600 XMM09=00000000000000000000000000000000 XMM10=7373737373737382737373435c021e73 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=00000000000c72af RBX=ffff888012cbd7c0 RCX=ffffffff8a068715 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=dffffc0000000000 RSP=ffffc9000045fdf8 R8 =0000000000000001 R9 =ffff88802c73602b R10=ffffed10058e6c05 R11=0000000000000001 R12=0000000000000001 R13=0000000000000001 R14=ffffffff8e72f890 R15=0000000000000000 RIP=ffffffff8a099e2f RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00000000 FS =0000 0000000000000000 ffffffff 00000000 GS =0000 ffff88802c700000 ffffffff 00000000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe5f0ef4c000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe5f0ef4a000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f734d1b0 CR3=00000000238a2000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=000000000000000000000000000000ff XMM02=000000000000000000000000000000ff XMM03=0000000000ff0000000000ff00000000 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=7461657263206f742064656c69614600 XMM09=00000000000000000000000000000000 XMM10=73737373737373827373737373737373 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=00000000000ea9f7 RBX=ffff888012d10000 RCX=ffffffff8a068715 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=dffffc0000000000 RSP=ffffc9000046fdf8 R8 =0000000000000001 R9 =ffff88802c83602b R10=ffffed1005906c05 R11=0000000000000001 R12=0000000000000002 R13=0000000000000002 R14=ffffffff8e72f890 R15=0000000000000000 RIP=ffffffff8a099e2f RFL=00000242 [---Z---] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c800000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0d57a52000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0d57a50000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f734d1b0 CR3=0000000075424000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000008 XMM01=00007f53d4606a1000005621191cf610 XMM02=00000000000003f80000000000000000 XMM03=00007f5482603d6b0000000000000000 XMM04=000000000000100000007f54149b4000 XMM05=000000000000100000007f540f052000 XMM06=000000000000100000007f541894d000 XMM07=000000000000100000007f54144b4000 XMM08=000000000000100000007f54164a9000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=0000000000000032 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff84791605 RDI=ffffffff91ed7ec0 RBP=ffffffff91ed7e80 RSP=ffffc900038cf2a8 R8 =0000000000000001 R9 =000000000000001f R10=0000000000000000 R11=6572617764726148 R12=0000000000000000 R13=0000000000000032 R14=ffffffff847915a0 R15=0000000000000000 RIP=ffffffff8479162f RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802c900000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe185b80c000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe185b80a000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000002ee21000 CR3=0000000052361000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00ff000000000000000000000000ff00 XMM03=3930392e33333320205b203a6c656e72 XMM04=000000000000000000000000000000ff XMM05=000000000000000000000000000000ff XMM06=0a30232020394f3642202c2936303000 XMM07=20386420343720333020383020303120 XMM08=2500656c6f736e6f632f7665642f000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000