8080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:36 executing program 0: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)=""/227, 0xe3}, {&(0x7f0000000240)=""/248, 0xf8}, {&(0x7f0000000340)=""/200, 0xc8}, {&(0x7f0000000440)=""/138, 0x8a}, {&(0x7f0000000500)=""/230, 0xe6}], 0x5, &(0x7f0000000680)=""/230, 0xe6}, 0x40000043) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x68d) r3 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000880)={@mcast2}, 0x14) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000007c0)={0x9, 0x30, '\x00', 0x0, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000008c0), 0x101000, 0x0) recvmmsg(r4, &(0x7f0000001ac0)=[{{&(0x7f0000000900)=@can, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000980)}, {&(0x7f00000009c0)=""/87, 0x57}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x3, &(0x7f0000001a80)=""/40, 0x28}, 0x1}], 0x1, 0x1, &(0x7f0000001b00)={0x0, 0x3938700}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980), 0x40600, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001b80), 0x24000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)={0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000001dc0)={@dev={0xfe, 0x80, '\x00', 0x34}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f0000000100)={r8}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000001b40)={r8, 0x1, r1, 0x5, 0x80000}) sendto$inet(r3, &(0x7f0000001bc0)="608ac783fa4c418e275bc906db30dc472f6608d751b00ffb4bef66162462180c3d657210518adfa6eb89aca50cba05d80a9fec3cdf5815e75dc1a7a11d3ae28aa8b70d5d9f00106072d3fe2cb14865a0cdd5a07203b7930589717c06ba0ef681c009f3167d373fed7465a8eeb469dcbbf69a2fc776eb324eb67e57bc1f7b790b1104201febc27fd6f8f1b09ffa323b4c33defc66add511ae95dc5785c78e7a5ca6dbbe07948fd1", 0xa7, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000001c80)={0x5, &(0x7f0000000800)=[{0x3, 0x0, 0x80, 0x800}, {0x5, 0x8, 0x51, 0x8}, {0x8, 0x81, 0x0, 0x2}, {0x7ff, 0x19, 0x7, 0xb35}, {0x4, 0x1f, 0x3f, 0x8}]}) 06:32:36 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="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", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x420, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000b, 0x40010, r6, 0x1deb6000) preadv(r6, &(0x7f0000000240), 0x0, 0xd9f, 0x0) ftruncate(0xffffffffffffffff, 0x5) 06:32:36 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x0) [ 1064.186578][ T25] audit: type=1326 audit(4294967556.783:6739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9307 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1064.233888][ T25] audit: type=1326 audit(4294967556.823:6740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9305 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:32:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000604000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000008004000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000005000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000002b05000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000006000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:37 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c41f90f00009460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc8cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a85ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f61af367c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af079c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/exe\x00', 0x20040, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB, @ANYRESHEX=r5, @ANYBLOB=',mmap,noextend,debug=0x0000000000000c67,dont_hash,\x00']) [ 1065.010741][ T9433] 9pnet: Insufficient options for proto=fd [ 1065.028311][ T25] audit: type=1326 audit(4294967557.607:6741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9307 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:32:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x7, 0x68, 0x2, 0x6}, {0xff, 0xff, 0x5, 0x1f}, {0x8, 0x1a, 0x3f, 0x1ff}, {0x2d, 0x95, 0x8f, 0x1}, {0x5, 0xfb, 0x8}, {0xe3, 0x2, 0x0, 0x8}]}) 06:32:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet(0x10, 0x80003, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000001f00)) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000001e00)="1bb24315f519330b02311fd0721093a15f0300f0706b79df413162760b3e2b4f97d7a5dad6b17eb30b70b2afa8ec2cce4eec8e41e1a6180770dd59299683657e3307f3d2b0d7b831ddfc0eb1f1779d1e24fb96e3b39faa10c9f5418ef3380d9123a53a2003b4399d702391dd50860b5706bf65b735d6a2e49c4f95e2a8728da6b9796cf327363000bd9b90f009223c6bc762c8adad3ad506", 0x98, 0x377ca178ccadc5d4, &(0x7f0000001ec0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$sock(r2, &(0x7f0000001d80)=[{{&(0x7f0000001840)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x100000}, 0x80, &(0x7f0000001980)=[{&(0x7f00000018c0)="02f4f3907508926b34af4d08ebebbc3283a4c9bbdba2f424e838080802d0723d3ceb59e41a151bd38f7bedde6a1b1b7b4f900044c66f95cae6d3cffe14c0e1bf5cd754ba2c1b8ddd68d4dd31830b09654eb9d5b5596a0c710cd31dae92ac5acf0e58437c527a8f6606db1934e3efddcab5cffb7574dfa8c02f2269f4c1cb55296a2c66e5e4d70e61a361944bb439b0c9d41c90448927d98e22", 0x99}], 0x1, &(0x7f00000019c0)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1ed9}}], 0x60}}, {{&(0x7f0000001a40)=@xdp={0x2c, 0x4, 0x0, 0x32}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001ac0)="9b1b1b1fb74eb3f627349fdf5ecfa6cd9709bcc1e18027f5408dfcc00d869612144dfa17775399b975d3f6d56b1ca1d72e06", 0x32}, {&(0x7f0000001b00)="06d48a531b97789300a3f8e84fefdbdb8b57bf1cba180c9c456afdf8973fc376a199894f1db8c8909dc2030ff7c6a8eabf830b0d59214f159689fc278a4987d6456ef76fc8f5f1558c04412c0c425f38c263fa3142724806ccbd44f7a88c94a6fb409c3c1f9f60529c96718ad69be7df83a47685ae66473ae04cf6971a3bce25a23c8810460080d5e97cfa15b2f55d4508c25c29494f4d64a0ba7be74ce3178f99a00caa06dea2ca31eee28c2e0e962d95c43367ddd09f9fd8e77d9dd084955d1e2b2acddc2b04685514925d52df8be6", 0xd0}, {&(0x7f0000001c00)="8a4ddce48947c6a02650403a0b1fbf5b2798511cdfc6027e25034f979d8f4fdd9ed54eaeb1f44941a9e892466b29a0430d118ce611a0180de504935d7a5a361016deefa6fd9bb3d073222957641049a9ba4938b3bfb19cfd3610cf57903b9d6e12f1e3f0070b10ad9ccb3b4b105754214ab9871b6bb9f49fa19733ae65131d08f964bc85675e1e6f76dc594a4a247f957dd50b2d23a8c0e22d2fb09497766d7dd82879847a68b86a0105c37a52fb9e1fc515afab0eaa7517dd6ae939e2e683fbe4e79abbacf0775a62e99026e1511128aae21e05a6", 0xd5}], 0x3, &(0x7f0000001d40)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x30}}], 0x2, 0x4000) vmsplice(r0, &(0x7f0000001780)=[{&(0x7f00000000c0)="5a5090c638d183640880d44659eeb0ca60154a36f1f3d70d7e290efa2acffc4fe7fa2c9d3cf73d02d78a8a21df60d7169c1ff59d3a462ac983b81a2b20d4e6d08d6772e146ffed37d3d46b688ef328b075d215baa2a2efe25bfd5c6aa6bbc792ceaea1f1434e3e5d5b3670c60ff65bcec7d7b5a7aa2863b1c056e6a81ce263e575dc94dbc9691d54324a3abdcc67e2e5171b3a468ffd215c24d0dc4bf124c870f0aaea4b597b77f23c6651517e7f1832733f02a84498d747c36d2b8db8d0e96a834580ccc5fea2c4cbeb677ab2", 0xcd}, {&(0x7f00000001c0)="ae851b5c0bd1deda19fb71fc3b7c3ad39cf854f0d7c774d35896a2bc31d392550c0befac914bbe42c07ac5429e401b067f723e2dd315c56a4b65fc94cba9067ab54da285715998fbb9c1e1ff2af1d02ee6a5d08b752bf09b60d0fcecef", 0x5d}, {&(0x7f0000000240)="626a4ac003d0f6f743977a7cdedfd1bc2a79bf063d370b47f45e41c1dab97f9208d16f54f4d6678af95c35715a541a4982249dd3fc71602612b0bcc4f30bb8e2d574e589a760481ac540c626a545cff153d8dfcc2c2e8293358efa1bae529d69dd6de36f7972f941a07e37fcf517ab52faa11860ac0877539d4283801f53c5a20871e2b04cbbff26d67b6e101900b448d009a261f8870d8ccf8aa900ef3214ccd7e560c016430bdfd33275bea53da3e61ee33e2e5dd908588810e511994029dd27db8390", 0xc4}, {&(0x7f0000000340)="5f57d3572d69b8a2d63555121f01a582ede8cfc26d17490f751760a94a7e16f072d2c0b8420dae42e85c6132ab34589cc82ef543f7a47594d6d099a5884a1381d0ea79687cdab2e6", 0x48}, {&(0x7f00000003c0)="7269d649286cc60f6d397cbf05ab1eac2e1b7c0940e0131d7d77096d87dae39997a825773b6f0bcea28f600a1f7a5ecd5b8fc6d47ede5021abe794f05aa0dc01112180e4621fa54f62a6867d5c6c114876191256f8054c4fb91af094232bd1504f296e67aacc160be6c5ef1dc82124105bbb039bead251f9ac293ce6e59451a96226fe8a185b5d47417d0675cf7b1f85b14d895b39cee3b532c6e353178aa86bc12a2933973d2a0ef041258723ba025929ce2c7e352d29645cd73561b119881126dc0c67a785c6a924d5ad82ea161537fd57", 0xd2}, {&(0x7f00000004c0)="455b145d7b3e01b492bb972d6f4921dbbb5d3a3b6b01d70cf06d77bd3d7d1333b6c4a0f17f74de4830ce248a7d4fbee7d9668c36994f6d07f39e487e03b5948ce8e68b520b7998c5841e5cd9013041748b460fb148210fe83c27851f0802be72f531eccecc80313905202f58d0bab66fdfaf4c0d9a1d70b5bc0a26c215f277dca6b720cb4185583986e5d04eb4511e9ded648e1194d36f272bfc41a44300d6f2a4284b7d411a0a664a46c2e3582d63c2fd830dbea035f4c8bb0836330a8646a5dd9b246de7c3d5672254fe51dd7c0bef6f5cddd1e01881bdf5f78cdb3a9c237537bc610ae559d1d91d5b1abad5", 0xed}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="c136e92813ed01ea18c7416f4b0eb24683ef93fd7b4eaf884fb47aaa69e65cc5a660a8bacde29ed96663b0efc55216c03398d9ba03544400c8c669dd7b835db3ffb68f10cea4220f45e536ab2ae7eea0e5dee62ac169e2a4b2df34f4b8407683a9a8685b3045b7741e474e5796a262615b33cf314ce034b7293d228533cff0f21827a1f64d7b819584a0702df056e4bb2b8e826cd45f889468d38a8f5a0472568b6e9996b9dcdf7cdc36b9a7edf324372dfd", 0xb2}, {&(0x7f0000001680)="f2ded2be1551c28c92c062b306475a378e09991a01d1d8269f2fda8a5a91dfee28dc248e301664daea377fc0884caeefe14f90070e2044f7fa6f950cc64ec087a7e4b1783e6ad817ee590babbcae7abcba1c95536f049822075051fcb1bc0e23787f7b30d35b30530ebdc0dd5685ed22c74687e9095ff737ba15d9771aef419deb2b7c1ea3b3859bf0bac23e5541051c183c3eaf03d5bc78aed315ca109ddcd231787d48b88e8070f3b5241fec6770a730711d7d006832d7586b45dadbaecfb5a894c0b1f1e7c2ab96d4454c53b14ca9549cb8ef3c34fc6c0dd68cc5f28a303c8c8bd30f8408b32d7a39d9688935be", 0xef}], 0x9, 0x3) [ 1065.073897][ T25] audit: type=1326 audit(4294967557.607:6742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9307 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1065.099847][ T25] audit: type=1326 audit(4294967557.607:6743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9307 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:32:37 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={0x0, 0x3, 0xa03}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:32:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000406000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1065.249503][ T9463] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 06:32:39 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec152c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410e01000000000000007f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0ce45663a44ffddd3ed527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713deb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f65aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a900"/232, @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0x440, 0x3f3, 0x0, 0x70bd26, 0x25dfdbfd, {0x4, 0x0, 0x24, [0x3, 0x4, 0x401, 0xfffffbeb, 0x3f, 0x6, 0xffff, 0x800, 0x92, 0x1, 0x20008000, 0x4, 0xffffffe3, 0xc0, 0x0, 0x7, 0x7fff, 0x4, 0x8, 0xf1, 0x100, 0x800, 0x3, 0x8001, 0x200, 0x7, 0xb55e, 0x1, 0x2, 0x4, 0x5, 0x8c, 0x1, 0x5, 0x1, 0x80000001, 0x5, 0x8, 0xff, 0x7f, 0x7, 0x9, 0x80000001, 0x200, 0x7, 0x4933, 0x80000001, 0x7, 0x7, 0x80000000, 0x75d4, 0x3, 0x10001, 0xca, 0x9, 0x0, 0x7, 0x610, 0x380, 0x9, 0xbba6, 0xdae, 0xffff7fff, 0x7], [0x8, 0x5, 0x9, 0x4, 0x2, 0x0, 0x0, 0x5, 0x14000000, 0x10000000, 0x8000, 0x4, 0x5, 0x0, 0x6, 0x401, 0x800, 0x3, 0x612a, 0x6, 0x7, 0x4, 0xfffff6af, 0x3, 0x9, 0x4, 0x1, 0x3, 0x0, 0x8, 0x1, 0x74, 0x9, 0x2, 0x6, 0x5, 0x0, 0x4, 0x10000, 0x400, 0x1, 0x4861, 0x2acf, 0x1, 0x3, 0x6, 0x8, 0x4, 0x7, 0x6, 0xffffffff, 0x7, 0xd7, 0x101, 0xfffffffe, 0x1, 0x1, 0x80000001, 0x101, 0x7, 0x5, 0x7ff, 0x3], [0x7, 0xffffffff, 0x29f3, 0x6, 0x2, 0x100, 0x3, 0x3, 0x0, 0x0, 0x0, 0x101, 0x1000, 0x8, 0x3ff, 0x7, 0x4b, 0x800, 0x3, 0x0, 0xfffffffa, 0x8001, 0x7, 0x0, 0xbd9d, 0x206, 0x7, 0x7, 0x2, 0xd6e, 0xa0, 0x1, 0x2, 0x200, 0x7, 0x21, 0x7ff, 0x81, 0x7f, 0x7, 0x1, 0x1, 0x6, 0x8, 0x3, 0xfffff000, 0x7e, 0x9, 0x2, 0x3f, 0x7f, 0x1f, 0x4, 0x1, 0x4, 0x4, 0x8000, 0x1, 0x80, 0x8001, 0x9, 0x8001, 0x4, 0x7], [0x3, 0x5, 0x200, 0x3, 0x7, 0x5, 0xd98f, 0x0, 0x9, 0x6, 0x2, 0x80, 0xd54, 0x0, 0x7f, 0xd9, 0x9, 0x7fffffff, 0x0, 0x6, 0x7, 0x81, 0x100, 0x6, 0x3, 0xffffffff, 0x13c00000, 0x4, 0x0, 0x9, 0x7ff, 0x8, 0x5, 0x8ca, 0x9, 0x2, 0x7, 0x5, 0x2, 0x7, 0x5, 0x6, 0x6a, 0xfffffffb, 0x587, 0x1ff, 0x7ff, 0x4, 0x8001, 0x5, 0xfffffff8, 0x800, 0xff, 0x0, 0x5, 0x9e, 0x7f, 0x6, 0x1, 0x4, 0x9d2b, 0x501, 0x6], 0x1e, ['vfat\x00', 'vfat\x00', ':!.^,@^7$\x00', 'vfat\x00', 'vfat\x00']}, ["", "", "", "", ""]}, 0x440}, 0x1, 0x0, 0x0, 0x20008000}, 0x10) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x99b52000) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000940)={0x2, 0x80, 0x4a, 0x49, 0x9, 0x2, 0x0, 0x1, 0x820, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000340), 0x6}, 0x0, 0x5, 0x80000000, 0x4, 0xffffffff, 0x8, 0xff, 0x0, 0x8001, 0x0, 0x1}) 06:32:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:32:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000007000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7f2f9141, 0x6000) r2 = socket$inet6(0x10, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = fcntl$dupfd(r4, 0x0, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r9, 0x1, r0, 0x9}) 06:32:39 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000340)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x28, r7, 0x701, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x5, 0x63}}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x164, r6, 0x0, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x7, 0x6a}}}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "ba09dfcd7b88bc82c029d2be310dc75ef6ed726b35fa889b"}], @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "e46eb7b17ba4d61579d5c13f7940a2b8a12183f45c6f31c8"}, @NL80211_ATTR_MNTR_FLAGS={0x10, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "db94b2293cc0ad3af08580e68a62c45beb8ee6df889d4195"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "33a4d32b1df222f327d262d0ce40c693af5fb64a6a96aa05"}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "69b283dd39be122e93d0a698fce25dd41956ac26e20f2307"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}], @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "89ac391d49b4f9045473049282f1a7a90853ee60f0b9a2e7"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MNTR_FLAGS={0x1c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}], @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x164}, 0x1, 0x0, 0x0, 0x40090}, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x540, 0x0, 0x2}, {0xe000}, {0x6, 0x0, 0x0, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:32:39 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x0) 06:32:40 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x1, r2, 0x40, 0x16917cadf62c6d14}) [ 1067.385317][ T25] kauditd_printk_skb: 556 callbacks suppressed [ 1067.385355][ T25] audit: type=1326 audit(4294967559.949:7300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9484 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1067.435012][ T25] audit: type=1326 audit(4294967559.999:7301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9502 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000e000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000018000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000001c000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000026000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:40 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x7) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000052b000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1068.217971][ T25] audit: type=1326 audit(4294967560.783:7302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9484 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1068.276425][ T25] audit: type=1326 audit(4294967560.832:7303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9502 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 06:32:42 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x5]}, 0x8) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$inet6(0x10, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x3, 0x101082) sendto$inet6(r5, &(0x7f0000000340)="0e79d4e054ebd169e69395bbbe46fbb8c2b33d3613ebae617d886c6aaa135182aba3c1cd2eeee70acfa8c112dce9d329fdd1af67e80c2f11d34a57e9d076b3b05e225bc62da837c713ec6124f2e5508ce7afa0d4292c30e72f4963bb6c14f06e1a1cc619d18938b5c7b8853175b4c88999bc6f9a5cc8d296ec8f4c73bcc7deb859664061c68b9f118d84c5f9cfbc43b850f38f31a5b848a5bfdf49e80954598ecd0f2ac52b082fa52f062979288820de61944560e900268066f4b457c0a7722702db7ce13a39b0b11e7aed28f9f9ac702f9888", 0xd3, 0x10044010, &(0x7f0000000440)={0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, 0x1c) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) r8 = fcntl$dupfd(r6, 0x0, r7) fcntl$dupfd(r4, 0x0, r8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r8, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20024001}, 0x20004002) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48040}, 0x40) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x0, 0x80}, {0xa4}, {0x6, 0x1}]}) 06:32:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000003f000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:42 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000000780)={&(0x7f0000000300)=@can, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)=""/161, 0xa1}, {&(0x7f00000005c0)=""/161, 0xfffffffffffffc89}, {&(0x7f0000000240)=""/6}, {&(0x7f0000000680)=""/145}, {&(0x7f0000000880)=""/9}, {&(0x7f00000008c0)=""/66}], 0x2, &(0x7f0000000ac0)=""/210, 0xc5}, 0x40010100) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:42 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{0x401, 0x0, 0x1f, 0x3}, {0x1, 0xff, 0x3f, 0x7f}, {0x7a0, 0x40, 0x4, 0x200000}, {0x7, 0x0, 0x1, 0x8}, {0x0, 0x9, 0xb1, 0x9}]}) creat(&(0x7f0000000280)='./file0\x00', 0x80) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) r4 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000002c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000200)={r5, 0x1, r2, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000001c0)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000240)={r5, 0x3, 0x1f}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={r6, 0x3, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) 06:32:42 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x3, 0x0) [ 1070.422943][ T25] audit: type=1326 audit(4294967562.956:7304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1070.467583][ T25] audit: type=1326 audit(4294967562.986:7305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9630 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) read(r0, &(0x7f0000000000)=""/31, 0x1f) 06:32:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000480000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1070.580044][ T25] audit: type=1326 audit(4294967563.125:7306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9660 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000fffe000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000feff000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000c0010000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000080000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1071.265630][ T25] audit: type=1326 audit(4294967563.800:7307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1071.307106][ T25] audit: type=1326 audit(4294967563.800:7308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1071.331481][ T25] audit: type=1326 audit(4294967563.800:7309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:32:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 06:32:45 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff88, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0xfffc, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x80008, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000340)={0x2, 0x0, &(0x7f0000000300)=[0xffffffffffffffff]}, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000004000080000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:45 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x0, 0x0, 0x400}, {0x64}, {0x6}]}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000008c0), 0x200, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000bc0)=0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r6 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x5) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r9, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000740)=[{&(0x7f00000002c0)="453cc69c3104d74e31c855aa06c45290136508d43be9e6cd562bd8161efa6078d0769f7ddf6f7360bcc205a4c3889258d4bc12d07d8ba704b05a64d514c411c38d8c6d30a7323b0a45d2d691c550861de11438fc5ac81b0050cd985619c367d5d8aa9694eac22758155695a25f10e57c4915ebd6adfc73b299efcdb0b5c8078e5e340a0bc2ae9413f176133594b9ef8ab3a8edf1bac4d986f9164eeb3efc47feef23d6062e6ad51bd1048f8b649c43416900214d8f21bff80f19d1a0e1247d4e4beddc16357347dbc63fd9551fd9a5aa9c83ba0cb08b6b3c8d4b539957f978c4501fa7532b5b2b39a6b7a8839495fb88e81f26c78c", 0xf5}, {&(0x7f00000003c0)="a138612a8a556e5fc0a21a9d80a2b9f6d2562544f6e050bae9b1bac28e801a410b007059216a34267a0349f30d508857b43418d8f542ca94b0735ec27f2e35ebd615e5422f770158dc8708d0d55d7fddd89b510e343eafb12cc113568c8b502e77230cd41138edbedbbddc45fdb92a3a1481", 0x72}, {&(0x7f0000000440)="44f80b19d7be809d0a1c9bbaaedb8fa3b8a074d771d31b44bfb7ad04c893c6117cf3675160ad7c078d8eaa27ac71bc0b4f25fce5a2246204d293ceb3e0593c7aedba9ef1b76090c20f12085ca1798e90636d4e19057a8938980316d7729ca01351cab2b41abd3a603dd098b3e479c7afbd2c0a466792455abf663df1bba7372a4701237dd409f2f86be4f39ddaa6c0b9afb8ee56b7cd0817e2fd6183d5c68199130514b86a44cf7a6ab1b0e25fd5ce014665ef2410093412d9ad81648be58a769ad480f44e80e6bcd565879db3d7d5fb1a00360d47a812b4cc85e2a3af073169051c5e8997f18175b467", 0xea}, {&(0x7f0000000540)="ae8c538f34f4eef35d455b64da82f7cdce129964c80023e492172fe3878165ec987e004abcc981b9549df0116ad95ebf539e1836117530e94251a6ecc36708699da78b223f81f3be9055ae4398d47cfd3d370c916d07111e9e7f2b20d3e49c4b3672ffe2c39349874b4b53ea67285ef244d99e75dfb66405db2786ab4a9c06a52251681bdf29e7bf2680e8f551c20f", 0x8f}, {&(0x7f0000000600)="809f47e0b233584c0933465f54", 0xd}, {&(0x7f0000000640)="337246f04754da385cce86b6f82c650b5dfdf122ef77045d29d6da0c7a5575a8a51662500195817a43c24678f0bcb5f5a7a7f10272de1cbabf7e153bccb7253c84ef5e24a09ca1ab41e80e0b3e45366c6bf7a2e856340f3538113e261b04d99287d764dc00a33472242eab3a9a5cd3a56da44a1da5a8b6ecc675a5e6826727f07cce8a43046dd7a067b73b3bb57ec58ec1cbdf6d3ce07cd3cc25fc40ee43018316198eedfd38b918ae25c99b035a78d2e63ad46c4207151de1ff7110f788d24f6ff94f48c4ed649b38555ae765fc5220b6f8eddd6a0708e9556f8521d73981e8913fe9b728", 0xe5}], 0x6, &(0x7f0000000900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r2, r0, r0]}}], 0xd0, 0x20000000}, {&(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000a80)="294f4ee2cf611b378e80191e671a3321f9f03570af4bcd42ad50bd5ec8485603e6629a87a4064c2203f617bcbbe19f8ab3ad71c0ebe9bd28b9df2ec2e3463d63d628add1ba127162b0ecd19556bbacfb0d1abffcace0039c50625fd3a3894f26163710a6d4053a04259716db625a9fad3eee47f2684ef03ad8829b76fed137c4eb5a9c5f043920a83062877fbdb3e536c53c06e0308463ad2bee6f7e9b9eee4511224dff6a005c7f3a23af007fad92182c64c0178d61898818ff58ed409b0796a5af72b72550bb927e55669d39097bc37a8d12f88a3d010a69a9750ad5403427d2301abd3c1ae92f88718cb6265c3fa8", 0xf0}], 0x1, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee01, 0xee00}}}], 0x20, 0x20008000}, {&(0x7f0000000c40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000cc0)="f75b8332201c03e967a9d13320f9a7a60d5869927dd433ec7bf5d4bf5fac9d2f279103e553d8112ac9301b6bb6948559751003ee44c0214bba86188be5f62185ba49ba7aa10b749882baba39819cb4e792b964d30f304b259161cf687bfd1a035f97b1baee05b90d6446b9cd3ac954aff5f8b3dc05ed4c9f4c16b32a137f7d9d10dc9ec0", 0x84}], 0x1, &(0x7f0000000e00)=ANY=[@ANYBLOB="20000000000000000120000001000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0x70, 0x4008040}, {&(0x7f0000000e80)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f0000000f00)="b1298f5c7f56103c5e63f01dbbca677184ba55dab441f90f2b36fcfa3a43773ae64badd10c73e39e209ada74b289b27b24bc168ff0e25fc66faf0ce6a33dcce07fa94509200a29d81391495bacf9404585b2dc4f719c633385a8de66ed870273bc83336ca317dfc312e10d240912d2a9d8494054ac761593ac1db9ff6536ff92d46b202c9b69a20065a755b2ac52823eb7a42060164dfac9aeb25992e5121c5a46b7edad4c964f842cecc8debe949ccdc77b0cd30eed9c1d52a39ffcb7811ae09221396395e7674522dae8357f7afba71827843e5545d520333bd3dbca30d9d5d76cdcd7", 0xe4}, {&(0x7f0000001000)="bf03585cd5b36aebde85f12fbf4d4b68435b2da40fb5eeda7d0ab70240e488fcf72ded15d94fbafac08e3af30f3eea59d508d83eacb383ab674ddad466e4364dc9c64579d57c8ab176b1365183fb54020867ff7291a38e57a0afee3744273f180d0231092523241c29aa5131691c2572e0f53f01b0600ed8d3127c403d53870439115d5f7e910ff61a1d", 0x8a}, {&(0x7f00000010c0)="166b88513dd6cf5474593e068c6333298fd50a873cfab2ddff5a24857c86763fb8268e7131bde647a106805e78d727263df7b3a951db9b7947356cd89e6c91f2cc22c8e78c8edc60650025652aeff29ba8e60d160e7524eced041ece7b9584e69c19a3dd5dd7b1c97de81b5578a4cb229e0a299c82ae9c40de929388f8c430cf60d6289b959b9cfcab70bf81161fa2236ec89f878932cddc7961e83e1d26b163b4b6ab6d7cc6cb1a7e64d3735f90ca1ff209db735a70e0bdb7ba19de12f68c67", 0xc0}, {&(0x7f0000001180)="da60da6eb844ca547c080b113faf0d9e7b28e57b4be144d1722c475126fff91b280b63891bba1808ce523aadb0c02c61d144e65dbc7ac77f5c8d6756f47e4d9630700d589ac10949dc66ca33ab33f909a9eb184b82dd27d462c2a3f2230bee9b7a3749e0561bcb", 0x67}, {&(0x7f0000001200)="c1909749e2ffa2037b199241e24b0610542698c2a12a3851304188014aa8295cd1d83409abe5dac89ab3e67238aafe", 0x2f}, {&(0x7f0000001240)="9f12bd79ba34c8758922ed97f3399bc11f4f3e190984b28a5e1bff26d3fa9905e16f99d4d74edc408152faecd940e5717d65b05a54875e7a5a90483d86fd23f2b0110b", 0x43}, {&(0x7f00000012c0)="282f845e94417a605789474b1cfbcd4864fc4b95790cec9ae3cf2065c72a0eaf2d4cabed9090f04aefcd", 0x2a}], 0x7, 0x0, 0x0, 0x20000800}], 0x4, 0x0) r10 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84c1d88d2c055472, 0x81) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200000, 0x100) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r11, 0x8008f512, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:32:45 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x0, 0xfe}, {0x6, 0x8, 0x0, 0x9}, {0x5, 0x0, 0x4, 0x1}, {0x8, 0x1f, 0x80, 0x5bc}, {0x7, 0x20, 0x3f, 0x1}, {0x15b3, 0xfd, 0xe2, 0x4}, {0x4, 0x5, 0x7, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000180)=r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000200)={r4, 0x1, r2, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000001c0)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000001c0)={r4, 0x7, 0x5}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x4, &(0x7f0000000000)=[{0x3, 0x7, 0x3f, 0x8}, {0x3ff, 0x59, 0x11, 0x1ff}, {0x40, 0x9, 0x7f, 0x401}, {0xe5d6, 0x5, 0x4, 0x5}]}) 06:32:45 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x3, 0x0) 06:32:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:32:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:32:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000100000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1073.597495][ T25] kauditd_printk_skb: 1815 callbacks suppressed [ 1073.597510][ T25] audit: type=1326 audit(4294967566.112:9125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9771 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1073.650878][ T25] audit: type=1326 audit(4294967566.172:9126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9801 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000001c00000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000100000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:46 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xf) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00005b9000/0x4000)=nil, 0x4000, 0x8, 0x1010, 0xffffffffffffffff, 0x9857d000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1074.331428][ T25] audit: type=1326 audit(4294967566.836:9127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9771 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1074.356965][ T25] audit: type=1326 audit(4294967566.836:9128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9771 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1074.483457][ T25] audit: type=1326 audit(4294967566.995:9129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9801 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:49 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80, 0x80800) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x8, 0x6, 0x7, 0x3}, {0x5, 0x7, 0x4, 0x3}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000040)=[{0x100, 0x7, 0x80, 0x9}, {0x400, 0x74, 0x3, 0xceb}, {0x5, 0x2, 0x2, 0x9}, {0x7fff, 0xee, 0x1d, 0x9}, {0x4, 0x3, 0x1, 0x5}, {0x6, 0x81, 0x29, 0x3ff}, {0x2, 0x3, 0x43, 0xfffeffff}, {0xfffc, 0x20, 0x1, 0x4}]}) 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000200000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:49 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x46, 0x4, 0x40, 0x3f3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000001480)='\x00', 0x7) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r7, 0xc0182101, &(0x7f0000000100)={r8}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r7, 0x40182103, &(0x7f0000000200)={r9, 0x1, r7, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r7, 0xc0182101, &(0x7f00000001c0)={r9}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000001440)={r9, 0x0, r0, 0x81, 0x80000}) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000040)=""/19, 0x13}, {&(0x7f00000000c0)=""/219, 0xdb}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/198, 0xc6}, {&(0x7f00000012c0)=""/43, 0x2b}, {&(0x7f0000001300)=""/93, 0x5d}, {&(0x7f0000001380)=""/33, 0x21}], 0x7, 0xfffffffb, 0x9) 06:32:49 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x12, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x0, 0x2, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x28, 0x3c}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:49 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 06:32:49 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x3, 0x0) 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040200000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1076.637871][ T25] audit: type=1326 audit(4294967569.129:9130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:32:49 executing program 3: ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012bbd7000fcdbdf255400000008000300", @ANYRES32=r0, @ANYBLOB="0c0099000008efff5a0000000a0000060006e1dc013b2b060900000074b774b10fbfaaf8bcdcbf17b72ac072e34ba3e2ee7d45d31b816f4a265eddf8447e64bc98b6c830ddb227fdda705ea25fbc9f477b916d65ff6b7a049517d411af4d171e9c95006791f4d63531fa04a643d4698c097b09b97e10dd6aa9ce1d19616f1aaf"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x51) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x90) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x30, r1, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xcaa}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x4000810) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r1, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000001240)=[{{&(0x7f0000000480)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000880)=[@ip_tos_u8={{0x11, 0x0, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @local}}}], 0x38}}], 0x1, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x58, r1, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xf5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x44000) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1100) openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x40000, 0x0) r5 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) pwrite64(r6, &(0x7f0000000400)="c1911f0cbe6b080000008af91220ae3f4ae02561f93d136d95c804f84f7d4fcaca15ee588e2f47a5f4f55023b54c677911edc459c3f811e6da1451154880efe75df440f342ba0eceba8b78a6759ffc0e26b1dce2e1ac9dfbd1b3287fa2e2706eb77e2e5df33d5fae251687796e527819ab2c78f77d849b07dc8db4607dc0dcd7156f1572d016539208b5752ca943ee1080928f6ede59305ecc33e8d8127f34766f7d918840eb21aa4b", 0xffffffdb, 0x80000fff) [ 1076.796296][ T25] audit: type=1326 audit(4294967569.288:9131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000300000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000400000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000500000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:49 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x4, 0x39, 0xa4, 0x2, 0x0, 0x81, 0x112, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1000, 0x74}, 0x6a20, 0x4, 0x400, 0x9, 0x0, 0xffffffda, 0x1, 0x0, 0x7, 0x0, 0x7fffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1077.486190][ T25] audit: type=1326 audit(4294967569.972:9132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:32:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x7ff, 0x3, 0x3, 0xff}, {0x100, 0x5, 0x6, 0x3ff}, {0x200, 0x40, 0x8, 0xb5b9}, {0x5, 0xfd, 0x81, 0x4}, {0xff, 0x9, 0x5, 0x7}, {0x1000, 0x77, 0xff, 0xc2}, {0x5, 0x2, 0x20, 0x4}, {0x8000, 0x1f, 0x2, 0x9}, {0x3, 0x5b, 0x1f, 0x1}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x84000, 0x0) fcntl$setownex(r1, 0xf, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}) readahead(r0, 0x6, 0x80000000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) [ 1077.533968][ T25] audit: type=1326 audit(4294967569.972:9133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1077.581103][ T25] audit: type=1326 audit(4294967570.072:9134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10054 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000700000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:32:52 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x3, 0x0) 06:32:52 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0x80000000, 0x1, 0x1, 0x200000000000000, 0x0, 0x8, 0x100, 0xfffffffd, 0xa8, 0x7, 0x80, 0x0, 0x73b04cdd, 0x9}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001180), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x30, r3, 0x400, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x6, 0x66}}}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4000044) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x68, r2, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x6f7, 0x49}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20000045) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000180)={r1, 0xf3}) 06:32:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1c, 0xff, 0x3, 0x20, 0x0, 0x10000000000000f2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x80, 0x0) 06:32:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x7, 0x59, 0x7, 0x3}, {0xd6, 0x14, 0x9, 0x7f}]}) [ 1079.596596][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1079.596609][ T25] audit: type=1326 audit(4294967572.066:9137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10105 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1079.632791][ T25] audit: type=1326 audit(4294967572.096:9138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10106 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000e00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001800000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001c00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000002600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000200)='./file0\x00', 0x2000, 0x17, &(0x7f0000000200), 0x2001002, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) r4 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="f5acec99631efd74398ad2a701daca0343fa3e8d45bcbf9a797ba4fc65eb946e02d131e68b7d2d85c8851b99cfd5d2a186572c9dd17b217dbf5a898a86199d7d1cdb3eb857f220af204109c2e30d5002cc39cfb10dd4e588a66f258da610af7e4ca4eff6a9d4762f065f8a76778bb2a4ef3f92d5543985c4dcea8755856be0705087f1e3d3e2388257648f3be9202473726df30180ab4e3aa4f82a9d12d97cbe860d71e9ad4e626be04e58d93aea1f0195", 0xb1, 0x9}], 0x80010, &(0x7f0000000440)={[{@nodots}], [{@dont_hash}]}) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1, @ANYRES64=r0, @ANYRESHEX], 0x82) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe0, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:52 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r2 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r1, @ANYRESOCT=r1], 0x82) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000640)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES32, @ANYRESOCT=r0, @ANYRESOCT, @ANYRES32=r6, @ANYRES16=r5, @ANYRESOCT, @ANYRESHEX], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r4, r3, 0x0, 0xa198) close(0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x73, 0x50e5, 0x81) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1080.436839][ T25] audit: type=1326 audit(4294967572.900:9139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10105 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1080.472192][ T25] audit: type=1326 audit(4294967572.930:9140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10106 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:32:55 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000052b00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:55 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000004c0)={0x0}) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000017c0), 0x2, 0x0) r4 = socket$inet6(0x10, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) r9 = fcntl$dupfd(r7, 0x0, r8) fcntl$dupfd(r6, 0x0, r9) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r9, 0x40182103, &(0x7f0000000540)={r2, 0x1, r3, 0x13a1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x2, &(0x7f0000000440)=[{0x9e5, 0x81, 0x40}, {0x3, 0x80, 0x9, 0x8}]}) r10 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x3, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="2f273eb5bfcd87820d777ef31db4c3215e9ad0d131a6668055a6f7f66b9ef6b381599441006b0b81c044fb5d92045cf974a4e1ae1311adc9daa70d36415a5ebeea2ae90e00a38af60d186db386a222143c887578c4706115e15ad6f04c016d58b146516bb2270b40486f72a162cffc3688c65760dc557489064bb80d401c4c458ea7762739ee3dbd6ff2597451043b1b3686442a5116c8abdb5bb8830a5bf8b72a2b05b4", 0xa4, 0x8}, {&(0x7f0000000240)="7cad0bdb14a1bfb08f84b6695c9af6ed5020b5bbe6e25f8dc7ca372cbe5ecedd6a4c28779c24e0459b5a16778a5d6684d7f5abdb647fb1e85f889ece33f7f1be1da43974ed6debd29182e5dcc71d3d38f81a17d98e44f5a05705840bde30880a003020591b98bbb8b8fc26cea52dffe470e79a15e50bd045e776271bea31b35e078973e68e24ec69f6cd315079dc9cb23dd78b", 0x93, 0x20000000000000}], 0x2000, &(0x7f0000000340)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@dots}], [{@fsname={'fsname', 0x3d, '#'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '&'}}, {@uid_gt={'uid>', 0xee01}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x33, 0x64, 0x66, 0x32, 0x62, 0x1c51ca8bf4a7cf69, 0x37], 0x2d, [0x38, 0x34, 0x31, 0x31], 0x2d, [0x34, 0x38, 0x38, 0x63], 0x2d, [0x34, 0x0, 0x37, 0x31], 0x2d, [0x66, 0x38, 0x33, 0x62, 0x36, 0x31, 0x93, 0x61]}}}, {@seclabel}, {@obj_type={'obj_type', 0x3d, '+^%.-'}}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000400)={r1, 0x1, r10, 0x5a}) 06:32:55 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:32:55 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca73610d5800172df5e8d67d713dbb40d4ff01ee58eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a900"/236, @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1082.630051][ T25] audit: type=1326 audit(4294967575.083:9141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10249 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1082.671187][ T25] audit: type=1326 audit(4294967575.103:9142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10251 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000003f00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1082.754262][T10272] loop0: detected capacity change from 0 to 131072 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008004000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000048000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000fffffff600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:55 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000fffffffe00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1083.470438][ T25] audit: type=1326 audit(4294967575.907:9143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10249 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1083.498094][ T25] audit: type=1326 audit(4294967575.937:9144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10251 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:58 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x600040, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:32:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b00", 0x2d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:32:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={0x0, 0x1eca871c, 0x8}) 06:32:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000f6ffffff00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:58 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x6, 0xfff, 0x0, 0x5, 0xe1, 0x0, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:32:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000007000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1085.620234][ T25] audit: type=1326 audit(4294967578.051:9145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10404 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000007000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:32:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000007000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1085.671750][ T25] audit: type=1326 audit(4294967578.100:9146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10407 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x7, 0x3f, 0x7e, 0x2}, {0x25f9, 0x0, 0x4, 0x9}, {0x7, 0x4, 0x20, 0x3}, {0x1f, 0x1, 0x1, 0x158}, {0x0, 0x0, 0x3, 0x7ff}]}) 06:32:58 executing program 1: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c41f90f00009460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc8cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a85ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f61af367c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af079c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/exe\x00', 0x20040, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB, @ANYRESHEX=r5, @ANYBLOB=',mmap,noextend,debug=0x0000000000000c67,dont_hash,\x00']) 06:32:58 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) [ 1085.799715][ T25] audit: type=1326 audit(4294967578.219:9147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10445 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:32:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000feffffff00000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1085.850418][T10451] 9pnet: Insufficient options for proto=fd 06:32:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000010000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1086.509186][ T25] audit: type=1326 audit(4294967578.934:9148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10407 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1086.642148][ T25] audit: type=1326 audit(4294967579.063:9149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10445 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000100)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000200)={r4, 0x1, r2, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000001c0)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f00000001c0)=r4) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0xa, &(0x7f00000000c0)=[{0xc4, 0x7, 0x80, 0x10000}, {0x7c1, 0x81, 0x57, 0x401}, {0xf635, 0x48, 0xbd, 0xaf}, {0x8001, 0x6c, 0x8d, 0x1abc}, {0x8, 0x2, 0x3, 0x3}, {0xd3, 0x0, 0x9, 0x8}, {0x1c96, 0x3, 0x0, 0xf6dc}, {0x9, 0x5, 0x2, 0x6}, {0xe6bb, 0xc0, 0xbe, 0xfff}, {0x1f, 0x52, 0x1, 0x876d}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xff18dee37d62ddba, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x8, 0x6, 0x0, 0xffff}, {0x0, 0x40, 0x5, 0x2}, {0xfff, 0x9, 0x1, 0x6}]}) 06:33:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000080000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x401, 0x0, &(0x7f0000000200), 0x20020, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@sco={0x1f, @fixed}, &(0x7f0000000300)=0x80) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:01 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) r2 = inotify_init() pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0, 0x10000) add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc1}, 0x0, 0x0, 0xfffffffffffffffe) inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000000200)="fe943b6ede385c76c0e1b19a451246fb791a35b09ac03245ea2d60332e1b2cfc8d2316cb763496", 0x27}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002540)="6f94a21cc3cb29917086988a08a2acf27a539e0ba4b414f4d2c9a9a7ebee7216d5007728533fee37955f706fa2dc96c31af03a4d5227ff72be8fabce9a84efa5bdd821e92726b4ef3d6303be47f41a0823d256cdb4587f0fe2621085b4d2f2bfeda75f84b623ca45ef1ef297dd14fad787df26918107137ac40ebffd134ddecea5562a394863", 0x86}, {&(0x7f0000002380)="34927bb87f18c060159e1ed2453d7ee8421753fc093199334f3923908e657b9bde10046a6226389da92b451cf9d0cc919c1068b43edaf13d3033bdd91fc19f1ebc8ba4c856031fc7fc22dc006cfb849b2ed98ef414b822cc208b8f91e9eee3730eff3d63070a51732397e34447bb7f6b9ab281452de736323c1c10b076373998ee8ca0b4e2ccf760b835c7041fc6e4aa6694956fbe9f388bdf5a2dd141911c07de789a81e7adc91e59afdaeee697809427", 0xb1}, {&(0x7f0000002440)="25b6a48081cc66a13ff939a20948a62e70f715fc0b1efb451cfef59e787d78118319dfa53901402832753e108a4137fc732c9351d78015e3da39048c418de24a9023e249bb1cd9b3579bb17490258313dea2929cde471e07d399d9e1be15ab35f5678ec00af7a7561662e50fc8135ac3a0b159da5d26c658bb798f54cc76c0e43690188e105424aff47031c88becc37d43d8986c8c9c004b051d71a62a8ebed00fbf815e2fca51c87941bd952c441c1d50cb008836393610e004080d00634d2d5e832e9f727361139214cf69aa271f809f1935c3e6bd59506eff9699c703d3c18046d81938b15339359f46d53c21e2336c444da1922675154a68ade9", 0xfc}], 0x6) ptrace(0xffffffffffffffff, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x3, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) sendfile(r3, r3, &(0x7f0000001340), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:33:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1088.705266][ T25] audit: type=1326 audit(4294967581.107:9150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10507 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000700000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1088.735493][ T25] audit: type=1326 audit(4294967581.137:9151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10510 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1088.766898][ T25] audit: type=1326 audit(4294967581.137:9152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10506 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000700000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000700000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000300000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1088.931449][ T25] audit: type=1326 audit(4294967581.335:9153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10506 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1089.545188][ T25] audit: type=1326 audit(4294967581.941:9154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10507 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000300000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000a40)=ANY=[@ANYRES64, @ANYBLOB="e1d45092d1c462a3d15ccb8e3acedb6f9a8601ee6c5df98e9f4be23bfc70442e2f6a6f02e917f77178b1e96b299d0c669eacf3c7498946569210aa2e0247a7a33be9e5cdfed47f051b886d07c237ac0e3abbf9d1b0cbf03b26b12259122a4b7f882cfc7404d9f66fc2328e09bb310af41a4eeaffb58d83d4e6aecdede107e0770da3c4268d731fbb4008766305f39fc4263e99641f9b44fc67058374d2e674990b9ce359726299d9a035afc3bf3d75b89ed488588c5d008007c7b5a296856ebd9dbf0f0b7142c823a9435f1ebf75526bc88fbf78b771abe6fbcf614c49c535a151b7e8e8a2ba4948632a7ad9d065a485b547291e9d98c76dbed0d90b431cc28703a92c0def6080110c702be5d8bb04783750dd99378edce67b5b586695023fdbe2444bb54c89af57974850f1ac3f74532c545ba93a59680bfa3f7c92556a29496d66495ce78798e565ba3608234345b465e7354a53987db61f1ec6564e2d8384dca6e00fa3c1a2d05b80ebff83ff0cc903df761ed64b5ffbd6106e6a", @ANYRES64, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="d755fed2f74606b656c8bdc113711f925370de38592ab5d94f0c353f4c63d22e03a46928c906e2a3694ae2031aa6d192101e4e976c0cf1f6d924cc6fe78c6742b9fb2761ddadf952124a3ecf11e7b3147d9bb70b797130e93251b26a51e033cb805b974da7336a92b7ed7f170db8a303194f60c8e7254b63d430ecdc28b063eade3aaddcde575fd801c9195706ac425585763f6eba3d05e7ca6c3c89ad7b7aacd28f6658f13956dad5af99131276ec6776d51e238ca43b94cb97ac27a3ab0bd34f1c167cfa190c7a3ad63f423a649628a30cd8e389cc61322a8af679e01adf70b10ced3ca261eff594fd3dc23860c6b276"], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)={0x7, 0x176ee, 0x2, 0x0, 0xa, [{0xffffffffffffffff, 0x2, 0xffffffffffffffff, '\x00', 0x509}, {0x1, 0x1000, 0xffffffff, '\x00', 0x9}, {0x0, 0x7fffffff, 0x100, '\x00', 0x180}, {0x100000001, 0x10001, 0x5, '\x00', 0x100}, {0x7, 0x10001, 0x1ff, '\x00', 0x200}, {0x9, 0x5, 0x3c49, '\x00', 0x860c20b7aadab24f}, {0x2, 0x8, 0x135, '\x00', 0x800}, {0x8d, 0x4, 0xff, '\x00', 0x3000}, {0x4, 0x0, 0x1, '\x00', 0x48f}, {0x100, 0x7, 0x1000, '\x00', 0x380}]}) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:02 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x0, 0x4}, {0x64}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair(0x1, 0x6, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r5, 0x40049409, r3) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r6, 0x6, 0x21, &(0x7f0000000140)=""/160, &(0x7f0000000200)=0xa0) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = fcntl$dupfd(r6, 0x0, r0) r8 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x7, &(0x7f00000002c0)=0x6, 0x4) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) poll(&(0x7f0000000280)=[{r4, 0x424}, {r4, 0xa000}, {r9, 0x1210}, {0xffffffffffffffff, 0x1}, {r10, 0x20}], 0x5, 0x0) fcntl$dupfd(r3, 0x0, r7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:02 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffffffd}, {0xa0, 0x0, 0x0, 0x1000}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:33:02 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 06:33:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000300000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TIOCGPTPEER(r0, 0x5441, 0xa) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0xfc}, {0xa4}, {0x6}]}) 06:33:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000001000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f0000000500)={{r1}, "07b4a78b75c37d8cc3e352b73258bf2eee4e5e0ea604464d7146e42b9aa762414d5055a9711231ede29bb34db2829026b5e1afb12660ac331dfe2c48463f104fd44ebe4667d756e8fd996c00f320fac953705bf9ca6e468cce9fc459180eee605e2cd32d6d6a26a79593a2d21eda8d736b9c5663880b9418cef3d68b38038df26cf1665157b26e1aa3e522e2a3512d1f5b6cd1efe52ea3eda89b9a8dc064c51739e0ae9d65f64cd4f3cfdf3514387fb05845070bcff0759c8574c1131f3af540cbc1fef40b6fde5a46b6c2e5071cadbc289badc59b219acfa4263a66d1e5c7b9829e86dd55f54a25339f637ece96dd26e15ae658d7a46e294735e4bfdadee3f3fe9331219f622748b6a4229d87c1fb2f33a7cf62a0d9e446e6483e3040076ca329df05ef87e8d3c79849e8d7903207c87a35ca1b99a88a42973299680f2ff703b6e6a313c3c76cbfccb77f5d224cf2fcf9b388173bd6717c11875b78a8a3b41ddd81703f19a029744e4c4f09576edf22fcb104a00073e3107a190081f6feb4a08955fe8cb491188b1dd85c0512a345c6dba4c8cd50de2dcef19496d79523fd105de61d47397202da7d0062ce48d3616f0f8f639f6c1aac01888c6e5c8d498bdd7e84e8acced21d47a8b004b5f8d88e9e28d1b28d619d8e42b8e81985bffb107788ec5295d3c020dc58a3c1d3be72abbe284d5a42e0ad1389a3b68f9f867b45ce9aa63a749f1ed73b5492887e283edce2c7716d62dff8a96b5a9bbee4149f8371273fe7950db2d3aa158caea459cae45ea153d26362b30f30bdb1aa241eb3fc5a205a71766b8a698ea0a30e90a5cdc91df4991d8ba55c089ce61288e561bbeef9b0a03ffedbb863355f643e8ed168d1a26c3c8f174460ee9bba3277eab0bab02d73525b76b23261c5ab2d66b20387246981380725ec60c535894921a34422f2191499ea30a4a7c72a685d9489f78fec5080b8e0e8b580fed07a425a7add3733bf9be2bdd00992c242942b5f8c371bbcf679d5e770b762ebec3a7e3c3cb986cafb908f23093fd0b73228dacbbdd6ed1a6be35adc37c376adc877f3308238848ae49ed7ebc0392c82065983eca4d8052c9d13a2b10a6515ba5caf15a6a7b81d7ea8a4c56578d1be53ef221c80c501c15cab0cd40582b6a88277d150f2808a208466fc28312858acd843d0213079bafcdaddb507b3481bd9b4b1c38562e86e88c1c8b025babdedcca4bf4109af0fa75cea21a18002dfd8bffe4a7d9e947f963d0bfb81722b16ff172887e5a309081cb8822b623e6df41e3d75f9f7459576e1fa8bda4f254bcaec592091ed08a643ef371feccd9db125071624d8b2c4d53c2dabadcad1f1f8fa89dff44c1cc94cb2e9bd5a3071a083be44eca33d5b94ac568aecbb454c78629c01d0ed08c597834ee0fe4da59f595c74e86d9fa8c6beb161e1d3fe785201a116aac5512bc9d9c1795699f39974017657dbe62d0b93c7e07aed64e3aa21fc4e80dd825c630db4cb9f7f46bca7795653c71560010bd83ca140c11138e5975e69d843d684da1a9223b1f235dfadb4576a11d66c357cfa60c1b6f500ca7483f07c5367f31408444c038a264a6b88391e879ab69738fe5a00edc3af2acd126188151092ab6a14d62c42ee497a9bad4f53d58dc90f48e53890c828bb1813a285d4b4d87f88cb159c05d53b43ab187f736db0f026f4f607a475ee07ffdd31d08c0c9c8cde6a4c843df052a6a4ff4e1a0760093c5b777baf7e93b3fd6c9aeacd82cc1635f0a5b24f6ac247b0ddae553c7e539e4ffdc7057751e73bc871d317613f8989011caf9708065a48a9f1ce247f3133ea5796a896cb6e24549fb089598f7c32d280ea9d28c236f2531795aa5b5c7f096d06e2c86f97e249f184254a414d369d609297cd9229e6a4f9782edc7d1c3f74962d4ff09ffbcd4b155c367d1a7d84a017a33e59738effe70499bc219ede1735fbe168224fc31eeaf3bba8a5f30f4e9f96595909875b1bdac5ef850cd5d9e6660bcbb814223b65c9accc0fcee198d5817b2e39a25219066909822495f6c8aa391dd0b2333a8e9afeee43c40573c8a42e2b9ebdcbb4381153859563e9ffd2508fec744cddb4ca22d16fe8e3b0facf8c3277095483fe6052889bd0b5eec54d0bf0c03572659faa94003829ab6988a561c91d8aa81e58f280f82a2b0090bfe5fff0af9018408849ccdb9675559f99f571292d73378bf5b295bbd63e5c0abaca2ffff0166d8dda8456e349de0451efa7d5e1a66fd6d0d0342e6598d18272efe1a6931248ff367658e89805da4c2c54cf1de08a40f2a01c68d58fc56bf52a178e7efbf7f2896c640755e062f2fd9fcbbfdb66b5d863c5855d78e9897302644c6d66a166acb95b156097bc1b8700bdf16d38503f4ea23def3dce897b9f02ee7b96f04092529b6f1f4d79c71ffe83ef0a79b8268c84c3c63c7fda9d89148e2f8dace62bc9e135f6ca0e38fe1734bf31fb605a65a07e1fb6f28bf664c0b9637f5e4a2362c040199d6937f01ab157e8c8914b21c0c840be3e7b3baf693c7bd4c3e8fc1312ba447f9e25fc686e00290831604cf29b7d8efb64c4c53a1f823b74a3b9a0567a6689eab23a744648b842d847d83d974635e0bc1fdc45469e93278d5a8d6efb7330a336dc48221b692e09a59ad42f6b2f952ef8973e7cb23041f6a870ac8602073821e8896c8a8c292e75f54fb993c0507be190b22e9bfaa9f8f89c58fb4bc9486c98a0d35c67a7696dafbd44b1820ac634fd794c85fb04903549637dd930e1ce7e8e3f4139bc89e3e5b11c1c6b003608e3d1ab0efd1f347e61db1f21ce21afb307f5a6138a5a69ce5931b9813fdc4b7d8522eabd51e5e9feed9c40950be2c76631599342f25754a231cf88441834cb9f91f9e36cb66fa0f99dd5ecde913b843f907a73f8cd153a9ead0081478c8c2b3eb0780f34d63650ed0464130803b0dcde10c96baf2ee697aa0866ec6f7346d2cd84bb0ce9128dfce2186e319d94e42d577ba8465bc971467fc73e9016ffef3719fed9c18ecfc81b46952e996580d3201ac0ad6e80e10b5849a6969641651daf307b6facde3b014563678b80b019e993b067e96f6b37857e4388fc498c00d12d6fb7436871078bcd3f3bf021ad2558161c0e3434efa46d930a6b8176b84df7116c0e702f5baa0e4b4e4fdbdc33abe9fc2efa6d3d0f1653ff96705e7aebe1a987648c6bba2c700244f3425b9606eea57eb1293f7eff1de9a20485ee5a3202433206b4d396827fc0e0d04233bd03da08745ef12c6902b92f37c0f820c5f6584a6110c45341af77a7b3c4b23b2f0ef472b8f41fe66ed9420e356822c4950e685d167c5d2f805e3b254b57646ce64aba97a8920e9d58752102a8ad390137c2e9b6a4f69839e6c19779db82fb9b0178121302f25e7e77e78b37371b709d5ffab1726f9da8bb1233461b2bda851b3a4fe2bb9816b96521e7528249fea540d259edb02fc99124084cb07e23126a1556d7fafc445e13ed20b09423f5fc49e08bf6dd9087ab4a07cb736c579ed50114f1223e50ff498df7f99be637387ac4442a95c76c3a78108b206caa10fdf78e0db77637aaf1f4fc2d3e1793186bb1a200a04888f96bb2afa38b03fb2279d74ee86c3462e411b195f315d03f08a3c6825f5029031110582f9c3b6621edae989c1842931807fe69066b66cb0ae1760cf66cbd6feb40f03e170aa4c0bf2c0c23056359a0f12fc347d5f07172b58fc87d27ecb1fe7e8536398cf1090fe5c2fc468326e0c8fd6df535710b32b3d7d11788827ce38d053e51b36b6eb24e1edc253b7f83a662aa8d507f67146a411addc63440718bae95b4891cd2c64f33754f64626cd6dd673d1b08ab71d780d2bdf7fdea51fa2c56c632164337d57cef79b0698a2be2450bc9fdab4759b987ad7fc4a0446c97565740ee807ab939d5359c2c9aa00644f4437f5b1da1617ff657f1295386f3d79ab848641aa838659e46a36158a6a2c4aec6a09f157ae7e39330708e2ce558c5a1b92c74502021c44fbfdf8b57f3a15e92fb13ff3f0bc56dac51ba20841ef71704233c9f6c8ad4c197d7cd4ed5b8688c72ac1469f21a7d950ac2a9613192125f955ce42436781b6c73f13396600ab1e5f08b07f3e42866f5f4c23f1d83f567481c39125f7eb988b2bbaa5b8a95cac4b28bd800be32719ada47f55c544447ff15920ec0c10aadaee873a56666352aa026bc45453e4797b92b3b71361efc9e64a399c61de212a0e55799174b997af88652733f69c92574c1aebc0827b0cbd9288adcf77e389a54036beccec9aa9e265fa6e63813d8053ae0da2128b8e62a40e0d99ee2f4af24aec669cca7d5153bbd9c49ae94b48dc22d9658163369985da1872dba8b56284a6081b356ff870e632df94ae7df092bbedd181b5f35f718061b37cbf45a674d784f97e5d95761b818122baf8e3bcd2e9468b713d82bef390078b909d5fba5801ca1bd089805e52339807b7e93f840f6d5cb6c303cb2fad75ce269010ef49d174b14c5a15c15b0edb61f0da9dc354011c88424ef7dc58cd1978b3682217618f1fc497b3e9a072169784aab59b6833e8408e09e205a28352ee35d1751253bca7b78d489c33a2134336480c5446b9634121783ac170b70e96321fd7469e0787dba7c90e273fcdbe44ceb4b5dceed8785ceb802696dac06ac8fdedf97ea547ced9cf4d700300e96771d489616be40dbfefd5a9686463b899fd2ff8cb8c89f75c7cad0fa0212488fe3d3238883cd3984880270a41a0960d5c42853cfc54fa227cd8aa67716ee51fc6191b80c5f2c0f73b685efd9ce8d3dcb80b53e0beac567d69fe8d7cccd56597b8c48e0a23d67cf759abbfa038551390894120892451c37c06d9116f790bbf01b3e51cafe40fcfd22f4dc23118171f31736340cad3711cc19d4ad9b9d45bcc64b14618a0018a82e36e00b0b79de8601446953fb8aa940b69aa775fc244c11118dbf9638954207dd2c2eafa4dec97d857a3eb728ccc8e17e7ef6b2cc9f3567c266fa7f2de6afff42e136af2b166a2a6959302994eb60efddae488f7c66eadc13136de1ba7f06542f9aba3433ae023ca245b473bbad3ab0855dbd109d3fee1f5e872319ca86df2b07083eed3e91a9bf1b703faead4b1360c4b7bd2356730f06d72980624eb276ab87b5ffd3c48752371609e28cd199e5fd0e0422da33b6429b3512e0bc72da55995a1b6362166d24e489c314eae967d0f7f2269ee51c7cb6dc51c017f84002dc2dfb41ec2b6e2f13eff1e734446c01ca3457656f6c2bbaf65bc855d04e47385dc54d9a47681553b11ee7b68514d94409eda3d4b6fdadc982778ce667a2d376083d39f7907c40685589c40b641c78a29651fb7a4479c3698026923568f4d73675a517bf8fbf37f18fb32d4e38920b6468d1765ad232f8a75505318ac3a8733f4516721b32516f1b8745044941503fd1d02b8ffa163309bd713d5dd67819f480f2a647b970d5934a57f98f48eb44163ff0c0a384c3bb7d2005a59bffbd2bfa0a1901e84a867525bfe1bc0d83b95f42e69dcb287551f4aac4b861ce8d262b23e85725d90c017c71bafc7e25d4e4e0482ba3f50f22e6335c19806d736d9637736d35097c7a280e89368517b215e96ac805527e55c9cb92a3851d64ec5279ec50cb2ddaa80dea5f45fa483326490a0e5a31fec49ced831f35e3a90b9a74fe65b616abd8633e90b101321abb8020f87034189340fda688a773d02446a5035c2f1ab99e9473ef56678a44db733ec96a74"}) 06:33:02 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) gettid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)=r1) r2 = syz_open_dev$evdev(&(0x7f0000000140), 0x3, 0xa000) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x810, r2, 0x1bdf2000) 06:33:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000001c000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000001000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:02 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x54, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xb) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x90) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000002000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000001c000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000001c000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000001c000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={r3, 0x1, r1, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000001c0)={r3}) r4 = syz_open_dev$vcsn(&(0x7f0000000000), 0x2, 0x20000) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r3, 0x0, r4, 0x80, 0x80000}) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000240)={0xffffffffffffffff, 0x9, 0xe4}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000280)=0x0) write$cgroup_pid(r5, &(0x7f00000002c0)=r6, 0x12) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1090.740585][ T25] kauditd_printk_skb: 10 callbacks suppressed [ 1090.740599][ T25] audit: type=1326 audit(4294967583.132:9165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1090.893199][ T25] audit: type=1326 audit(4294967583.281:9166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10631 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000feffffff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000402000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004800000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1090.975835][ T25] audit: type=1326 audit(4294967583.360:9167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:33:03 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000300)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25, 0x2}, {0x0, 0x3, 0x200000000010ffd}, {&(0x7f0000000240)="155152aea05f92edd6e5f8504fd61d22ed7d7fe777ebc9836bb419c7ddbdecb852e083461a44baa194e10f178b855ca35c543bfdd15104526dd8ff66b4b42a9fff383f4ae2301d7b315e9655d7d9306f46524634cc43fb28098012778eb9a613001f1ba43281affb1ba56d7ed9fd0e07c660fea7cf23", 0x0, 0x7}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) dup2(0xffffffffffffffff, r1) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004800000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 3: r0 = eventfd(0x10000000) r1 = syz_io_uring_complete(0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1a, &(0x7f0000000000)=0x6, 0x4) bind$inet6(r3, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000003600)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000010c0)={{}, r4, 0x4, @unused=[0x80000001, 0x8000, 0x8, 0x80000000], @subvolid=0x8}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)=r4) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)=r4) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000002400)={{r3}, r4, 0x10, @unused=[0x8001, 0x5, 0x1, 0xffffffff00000001], @subvolid=0x3}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000640)={{r1}, r4, 0x10, @inherit={0x70, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000050c000000230000080000000000000004005300000000000001000000000000000500000000000000000000000010f100070000010000000000000024000000000000004300000000000000a87979e6d5bd127075dc0dc043aa05afe31fa137634e20b83d3a4ba4addca5cc2ef00f8c8b6f6a7726b7fb08000000c1362d4da17df3f2dad9ab4db8c8b0cf4e7def754e9a4b35619f6504dc02c45123e97bc7d2a83bf44bbf07a600000000000033532c85477ac5cee4e85ea0a859b130b9e905e7f2e11d5ca77b57d94d3521a414337d19884bc228f80232ad959bfa4dd9dfd91845280400000060b0"]}, @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000021c0)={"e054efd1f0b8de003764f685c9e2ed18", r4, 0x0, {0x6, 0x4}, {0x1, 0x9}, 0x10001, [0x4, 0x2, 0x5, 0x6, 0x4, 0x8, 0x2, 0x401, 0xe8a, 0x2, 0x9, 0xef, 0x4b, 0x7, 0x137, 0x9]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000003c0)={{}, r4, 0x4, @unused=[0x4, 0x4, 0x2, 0x5], @subvolid=0x9}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000006c0)={{}, r4, 0x16, @unused=[0x6, 0x1, 0x8, 0x3ff], @subvolid=0x7fff}) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f00000010c0)={{}, r4, 0x8, @inherit={0x60, &(0x7f00000020c0)=ANY=[@ANYBLOB="01000000000000000300000000000000020000000000000008000000000000000800000000000000a3e200000000000007000000000000001f00000000000000ff03000000000000070000000000000000000000000000008d02000000000000903b9e516d780e538d4099ef0e08e50da10d614b43f1f60330dc27a0055d1aaab1bb79218ae07b99f622f5bdd9b222d88f3da3e521ae1bd6ebb17b4e"]}, @subvolid=0x7}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000000)={{}, r4, 0x14, @unused=[0x4, 0x7, 0x7, 0xa], @subvolid=0x2}) 06:33:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000003000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0xa, &(0x7f00000000c0)=[{0xd8c, 0x0, 0x61, 0x80}, {0x5, 0x0, 0x93, 0xff}, {0x9, 0x3, 0x9, 0x1}, {0x5, 0x9, 0x2, 0x400}, {0x7ff, 0xf, 0x2, 0x3}, {0x7ad, 0x3f, 0xfc}, {0x4, 0xa0, 0x7}, {0x7ff, 0x6b, 0x44, 0x1a}, {0x7ff, 0x20, 0x6, 0x401}, {0x0, 0xb6, 0x45, 0x7}]}) [ 1091.550673][ T25] audit: type=1326 audit(4294967583.936:9168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10760 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1091.581464][ T25] audit: type=1326 audit(4294967583.965:9169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1091.687492][ T25] audit: type=1326 audit(4294967584.074:9170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:33:04 executing program 0: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) r7 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r8 = fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f00000001c0)=[r7, 0xffffffffffffffff, r0, r8, r0, r9], 0x6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000004000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:04 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004800000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) [ 1091.722858][ T25] audit: type=1326 audit(4294967584.074:9171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10692 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 06:33:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:04 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext={0x1, 0x8}}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(0xffffffffffffffff, r6, &(0x7f0000000240)=0xd2d1, 0x5) [ 1091.770393][ T25] audit: type=1326 audit(4294967584.154:9172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10788 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:04 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYRESHEX=r1, @ANYBLOB="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", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000005000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) [ 1092.389116][ T25] audit: type=1326 audit(4294967584.759:9173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10760 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:04 executing program 3: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) dup3(r0, r1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x20000339}) [ 1092.609704][ T25] audit: type=1326 audit(4294967584.978:9174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10788 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4}, {0x64, 0x0, 0xfd}, {0x20, 0x14}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000006000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_NETNS_FD={0x8}]}, 0x34}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffe0, 0x0, 0x5}) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f00000002c0)=r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r4 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r5 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close_range(r4, r5, 0x2) 06:33:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x7f}, {0x6, 0x0, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:05 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) sendfile(r0, r0, &(0x7f0000000240)=0x2, 0xf97) chdir(&(0x7f0000000040)='./file0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r2 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r1, @ANYRESOCT=r1], 0x82) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r4, r3, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x4}, {0xf300}, {0x6, 0x0, 0x0, 0xf0}]}) syz_io_uring_setup(0xc3f, &(0x7f0000000180)={0x0, 0x3309, 0x0, 0xfffffffe, 0x3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x14) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)={0x0}) r8 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000000)={r7, 0x0, r8, 0x76}) r9 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000406000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0xa4}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffffffffffffe0000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x1}, {0xa4, 0x0, 0x0, 0x100}, {0x6, 0x0, 0x0, 0x20000}]}) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0xa4}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffffffffffffe0000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000007000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0xe2, 0x1000}) mmap(&(0x7f00006f7000/0x2000)=nil, 0x2000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0xa4}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r3, 0x4, 0x80}) r4 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x2) r6 = openat(r5, &(0x7f0000000140)='./file0\x00', 0x40, 0x0) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000000180)=0xe0d, 0x4) r7 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$FIOCLEX(r7, 0x5451) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x7, 0xec, 0x40, 0x1}]}) 06:33:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffffffffffffe0000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000008000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000540)=r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={0x0, 0x9, 0x8000}) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/107, 0x6b}, {&(0x7f0000000140)=""/199, 0xc7}, {&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/103, 0x67}, {&(0x7f0000000380)=""/151, 0x97}, {&(0x7f0000000440)=""/91, 0x5b}], 0x6, 0x8, 0x1) 06:33:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000000e000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:06 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r6, &(0x7f0000000240)={'syz0', "ef587525e80ac00901b7bf25d7c6a04ca9b4feb4fb"}, 0x19) 06:33:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000018000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000001c000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x80, 0x4, 0x1}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x7f, 0x7f, 0x1, 0x4}, {0x1, 0x6, 0x7, 0x7}, {0xff01, 0x0, 0x8, 0xf0}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) preadv(r0, &(0x7f0000002700)=[{&(0x7f0000000100)=""/194, 0xc2}, {&(0x7f0000000200)=""/224, 0xe0}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/59, 0x3b}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/107, 0x6b}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)}, {&(0x7f0000002500)=""/234, 0xea}, {&(0x7f0000002600)=""/201, 0xc9}], 0xa, 0x3, 0x1) 06:33:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000026000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000052b000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:09 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x443c2, 0x80) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000580)=ANY=[@ANYRESHEX=r1, @ANYBLOB="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", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x20000000000001, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000259000/0x800000)=nil, 0x800000, 0x3000006, 0x100010, r5, 0xf41ff000) mmap(&(0x7f00008b9000/0x4000)=nil, 0x4000, 0x800001, 0x4010, r0, 0xfd2ab000) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x8, 0x9, 0x46, 0xfffffff8}, {0x1, 0x0, 0x9, 0x9}]}) 06:33:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:09 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) [ 1096.981556][ T25] kauditd_printk_skb: 219 callbacks suppressed [ 1096.981569][ T25] audit: type=1326 audit(4294967589.324:9394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11107 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1097.032145][ T25] audit: type=1326 audit(4294967589.364:9395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11109 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:09 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf0, 0xff, 0x1f, 0x20, 0x0, 0xf2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d4, 0x10000, 0xfff, 0x0, 0x5, 0xe1, 0x0, 0x0, 0x4, 0x0, 0x8}, 0x0, 0x1, r3, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000006, 0x12, r6, 0xffffe000) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1097.059905][ T25] audit: type=1326 audit(4294967589.364:9396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11108 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000000003f000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000080040000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000480000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000fffffff6000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000fffffffe000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1097.820693][ T25] audit: type=1326 audit(4294967590.148:9397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11107 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1097.856034][ T25] audit: type=1326 audit(4294967590.188:9398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11109 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:12 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xfa, 0x3, 0x20, 0x0, 0xf2, 0x8a0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x8, 0x4000000000000000}, 0x44d0, 0x10000, 0x4, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, r2, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:33:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x2064}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0xc040, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:33:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000fffffffffffffffe000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x6, &(0x7f0000000000)=[{0x3, 0x5, 0x81, 0x5}, {0x8, 0x20, 0x39, 0x1}, {0xffe0, 0x40, 0x1, 0x1f}, {0xfff7, 0xc0, 0x2, 0x8000}, {0x1000, 0x81, 0x1, 0x93e1}, {0xda9, 0x71, 0xff, 0xbb}]}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) [ 1100.074174][ T25] audit: type=1326 audit(4294967592.391:9399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11246 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1100.130224][ T25] audit: type=1326 audit(4294967592.391:9400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11244 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:12 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x81, 0x0, 0xfe}, {0xa4, 0x0, 0x0, 0x672b68b6}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) [ 1100.163099][ T25] audit: type=1326 audit(4294967592.440:9401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11262 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000ffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1100.206653][ T25] audit: type=1326 audit(4294967592.520:9402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11280 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000feffffffffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000ffffffffffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1100.954944][ T25] audit: type=1326 audit(4294967593.264:9403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11262 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000003000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:15 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r2 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r3 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000240), 0x12}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r2, r1, 0x0, 0xa198) close(0xffffffffffffffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:15 executing program 0: set_tid_address(&(0x7f0000000000)) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x2, 0x3, 0x42, 0x1}, {0x0, 0x2, 0xe1, 0x6}, {0xf09b, 0x7e, 0x1, 0x100}, {0x4, 0x40, 0x81, 0x8}, {0x914b, 0x3, 0x40, 0xae}, {0x3, 0x9e, 0xa, 0x101}, {0x5, 0x0, 0x1f, 0x7}, {0x9, 0x5, 0x9, 0x21}, {0xffff, 0x7, 0x7f, 0x4}]}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:15 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='user.incfs.id\x00', &(0x7f0000000100)=""/4096, 0x1000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) [ 1103.126770][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 1103.126864][ T25] audit: type=1326 audit(4294967595.418:9405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11360 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1103.189901][ T25] audit: type=1326 audit(4294967595.467:9406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11361 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1103.226886][ T25] audit: type=1326 audit(4294967595.477:9407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11363 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000005000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000006000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) [ 1103.996649][ T25] audit: type=1326 audit(4294967596.281:9408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11360 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:16 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) recvmmsg(r5, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500)=""/177, 0xb1}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000300)=""/73, 0x49}, 0x100}, {{&(0x7f00000015c0)=@nl, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001640)=""/239, 0xef}, {&(0x7f00000017c0)=""/90, 0x5a}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/107, 0x6b}, {&(0x7f00000028c0)=""/147, 0x93}, {&(0x7f0000002980)=""/173, 0xad}], 0x6}, 0x7f}, {{&(0x7f0000002ac0)=@l2tp, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/157, 0x9d}, {&(0x7f0000002c00)=""/176, 0xb0}, {&(0x7f0000000280)=""/28, 0x1c}, {&(0x7f0000002cc0)=""/138, 0x8a}, {&(0x7f0000002d80)=""/33, 0x21}, {&(0x7f0000002dc0)=""/184, 0xb8}, {&(0x7f0000002e80)=""/199, 0xc7}], 0x7}, 0x2}], 0x3, 0x161, 0x0) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:16 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000001c0)={0x0, 0x6, 0x10001}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)={0xa, &(0x7f00000000c0)=[{0x2, 0x6, 0x7, 0xfff}, {0x200, 0x6, 0x0, 0x1526}, {0x3f, 0x2, 0x20, 0x4fc4}, {0x3, 0x5, 0x3, 0x9}, {0x5, 0x4, 0x4c, 0x400}, {0x3, 0x7, 0x2, 0x7}, {0x0, 0xf3, 0x8, 0x10001}, {0x2, 0x1, 0x40, 0x74e}, {0x2, 0x5, 0x3f}, {0x7f, 0x0, 0xff, 0x9027}]}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) [ 1104.272432][ T25] audit: type=1326 audit(4294967596.380:9409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11457 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1104.472006][ T25] audit: type=1326 audit(4294967596.559:9410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11476 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1105.105414][ T25] audit: type=1326 audit(4294967597.383:9411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11476 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000007000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:18 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64, 0x0, 0x0, 0x1000000}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:18 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9, 0xff, 0x13, 0x20, 0x0, 0x6e, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240), 0xd}, 0x40d0, 0x10000, 0xfff, 0xc, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:18 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1106.219162][ T25] audit: type=1326 audit(4294967598.494:9412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11491 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:18 executing program 0: gettid() r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x1}, {0x64}, {0x4, 0x16}]}) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x2010, 0xffffffffffffffff, 0x307a2000) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = fcntl$dupfd(r3, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r7, 0xc0182101, &(0x7f00000001c0)={r8, 0x8, 0x7fffffff}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x789703, 0x0) 06:33:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0xfff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000008000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:18 executing program 0: r0 = socket$inet(0x10, 0x80003, 0x101) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001400)="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", 0x140}, {&(0x7f0000001340)="43fb55e347dd5cf3a4f8e1fa790639ab3646259652a9b46e2fe4b6acf5ea86f1055b70bf97e20d9f3b7fdfb7c6e80435afd98f1213bac5da3048b5ab398a596821db071f3bfc7bbc5562ca45a6946b9100c543e52faca13189b998dac73c03469f4f5f35ec68b586ee86040b303e8432848bd42d86e316db8ee9d6b4c5db5f1fcc7d5c297025cf58e5e7f16916bee032f2e029f2a07cfe26", 0x98}, {&(0x7f0000001280)="5541a6e754e8d10e97a1a9e8eac53d75de23c12c7fd3866dd67494746711ebda30ee12a7fb94727294dd6ed7aa745964663bfc4ff54ef49676081778d7e883349d04ce204cf9cacb2b47f3204a81c2097d2edde4f21dc8817ebcea1a14495a265f6333ddc0c579fccde1061e3c558c0db887e6556c762b279e79bfcd3fc7", 0x7e}], 0x4}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', {0x2}, 0x6}) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x24044080, &(0x7f0000000100)={0x2, 0x4e21, @multicast2}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) sendmmsg$inet(r2, &(0x7f0000005f40)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @private=0xa010100}, 0x10, &(0x7f00000046c0)=[{&(0x7f0000001180)="75499bd2aaae8dea1471f33940ef685b698bdea6b0c2210b69e3ba5ce81577410ec36a7a6eac22e7b33640c04fb8232396f4304a770008808f0d19ef416e3f3d35b0dee3d9f4a5e2e9d9e348bf2bf37e65b197585654f030fab6ab0b9ad8", 0x5e}, {&(0x7f0000001540)="c8ce635407b909b5ed6424eff22a5e73c2a40dfd9074aad4c2e20e7d4175f6addd00ab66848c322596852c3b9bf9eb27bd1beb8631b4abe79027287c2a48d1588dad588dc0a8373398c53505404b1a3bfec90c94ace436c13421da0585059ee960b2d9fb4d486b0ae7205c78e1e06f7c03a4158b3f8d51fa3ab3eebd55f16b6fa47583fc4eed6b2d0e36913ec33fb2749730c581f6c64b", 0x97}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="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", 0x1000}, {&(0x7f0000003600)="9366e285f1e42dee2538494a686c56628cbd90040c0a0877d7304db06e018af415c5227251c1143e91054642f025a3fc860c96ac76991b397c5f7fe5afaa569c25ebf11efc21c9244e63e7be76484a40be158516054e822bffcd03ccc0483ca317c6ae53075acb9976cc8992bdb6f0225f7740175778e355df6b513ba1c3e184e5196d62e2c4e4c5766850e8be76f4b934fc0d76f97e0b83ce8d52", 0x9b}, {&(0x7f0000000140)="e9bffd409e20a6", 0x7}, {&(0x7f00000036c0)="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", 0x1000}], 0x7, &(0x7f0000001200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @local}}}, @ip_ttl={{0x14}}], 0x38}}, {{&(0x7f0000004740)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000005c40)=[{&(0x7f0000004780)='\x00', 0x1}, {&(0x7f00000047c0)="cffbfdce3e9462e248dba1060f72117f20cab4d3be07f6792fd6ecefdfc9aed931b96e8d6f2afd0b66980e9f931c1953132cebdfa23146e02a937c1a7a751102d2c18f10602796e0ce175d19af1ce64fbbe70fab32fa60607d7c45dfea6062ff95b735e8d017c49435e4ceb91e5a31cf4617c80d1dc919812b7f6f21374a2cfe633231172566dab7833abc6e640665886c07d70ba65dcbbbcbc6438447c90b8ee51da8bf2ea3c6e2f9fcf6016adf9efe7511d4570a3cda67df80fdf8211d6d392510a51777370a8383fc3696ee9531ddccc83b0da5bb8475b0d55f73b3e9a7b9e3f4dd96ee141d8f7f97cb72361c5c", 0xef}, {&(0x7f00000048c0)="865e9b28ad33b4b9929eb30033babb24177606fe64160b75a620a9c71460705deabbb09fce19edfecfa5e2c004a030dd062a7e0a18202709c8dbb99bcb518844d42722cce462aa8437f923ceb3b1c3522ee5c0d9f7944db96d7f5dc327188f368f129e7415e23bf59034b5c59723d03151082b62987eb0968b15d90f15b71b81b202ffe75f690b64166c1157a1d0cbd71285c28239b52be66c5b6fbb060f422fb69fff2aa6569a43467b2d920380b4bd467c5379aba76751f50fb92c66b2a5d58dec08f0dbc81362a0560e3e0ab1b4a9bab416b8b00630784ad959bb34efe2f92bbc959428d5ec28676bad", 0xeb}, {&(0x7f00000049c0)="3a38f91af5c8cdb8f6b9dbda4784d75d6a5be935f02161a0e72785be0e15f6e57dae64a5757885eeb9ba55a990b6fe008bbd31664b51c38896770e23cac6ed3b5ca94f595fed276d4f9207225c7f218d0381fe6a273a1b10a18d4c1a24b7b6fdfbbefec19c1d69dcd41f6f66fc7e104221ece8f42179f329a2faba6d7ca1b2f6138d05cea701565ebedcfb9fa7c645b7ee85050f1021dbc7559d866ade87e94671890e222cfdf2c5021904aa892aaab4fdb7b6b5b609626449a801e6d081bed9d1d13f17c6960b", 0xc7}, {&(0x7f0000004ac0)="5df59714e2be67c3687877b3da2923ad30df701c2bfc69dabe5d04cd8411ace11cbeb03f0e50c87db6d87e303adb85a09a822486ba9821141050226f4bac10a897cb71139519cf12449f77c183987f393e23a35313bc7b121b17d8b6035a9cde28f09dad136bf652066ee14fdf646fb6b377c7fdf0231131d5a89e55d54685cc0efcb9fba3ba0497b7f515e362d742ae05bb0c03390481e118ed7e44ca9aa76dff833781a815e9821c99e949501d9567bd23672f39cb673963eff38590fe9e491a643591012354fe48b56e751b445c8e81dd60ac667595f4b0831a284203d11d783f05a9d9728b45b030ee115f9d4a391228793cdc6d062b9d778ead9eb01db6275faaf7994d1061e4de8cdb79476afe2c12bb2e38b3efb9cc93db10328abfafc20aef85d4467d1bdcbd4563378f76c34e2d165110d927db02795ab8e665c2f2fb093d2b96fcc7d7b3107bc8c6e6f05723c55e75934ad6158f97192368ebe97449f84f0a05b89209fe2407b37e17bd3c34362ea85ec815b1071c27915610ddba8f0d33fbecd31c3ced6a3cc72bc16fec38bc0a65c2def2fdb2adbde39b59911e884c40e361a35f6b17080edfe5b1c12d2b0e982d6726c44e2791116e3809d8eb114ed96530c489989faf40b60e2676ac6ce42a22cc5dcda457a7a295e36ad664b0de5d823a6af7935fd7be3539e4901e389df6bca7d53089074d4e57ee33bdbaa00fa6897ffd5aef20bef181d741aad824a4005deeaddb15308cdfe33a3723659ed4d900e52638f4c9ddb5b7d78727451aa092d8cc45cf8c3d09bb382939a97a6ed758c0050d90de90b983bd1d2f0ec3d9cc8afb0468ce06ef79a6873d34de4d4cbbda4033fb0e3e8d074bf34c8c981a53ba147a076e93506703f18bc52bf8dafbe5763cf82746cb89864c616ddcb0773cb494ed940ee72c8d0fd988733c6a06b7aacf9f7e91f0369d296e417b1b92cf412c9f53a0ddb57a82efbf123a8190ea1dc9bbac995e78cabc09e1f1d3a8bf8c63d84bc98842f55e403d0415fd93f284a925dfcedcd1f584996d8a056d2519db20bde19686bb4c0f81dd1b88d0e05190a16f1f9ed290574d22f0979e75849b7add073edf55e636bede14438180768ac43c5935018042ab23ca9f01fb2796c5a543ff8040767b1be878e305f7baa9a59f851f4a6b4b578b80bd2b1b1ad67373bca3e714352e0c382e551f67216d3ae6352283c3244914cab2e57c5520cea7330b6008ea13f323b4dad269177e7d0b3b5a24433fe8c085896f0eac66291b3bef4708113786151f024845e33f33c72fceac8179df2be95be69a3c09d89f6f63938ecc151f63ea55a77fceb64cd72c6590dcc79037a40c32e6b49f8aa33e29f8bec4214b711a74ae0f80e6e49b3701b1624f9a96d4389ca47fe3c87d0430d76c802b41b38ba2accfcea8315750265efe44a12861a1433ae62664188fbd003a910d7d9e399d86c596de7fdf345fd0a84e6facc8b76c6fa4de7ed66d1fca52a7f622f7a9667c025f4de702ca6d34e566fdfb7683a181baab6d0e7abf37193fdb4bc8dd3d7bdcf1407be092ce0b83094e932e13cb4a71933389fc59ec47a03e6217120bda23e0b2d1242afa3ec45f9057f10dd1df3909cf392b177db88820ef05a45156fbb71b0c2e9011c778c9e58f62c4b65d1f61d23d94a6fe9302c8a05c62d5f3a7780c75e493b761d514e39015d34db1e049a656525ef894358619a99964c47fe497dc0b3e139f824db89016686922d2baaa97886a41ba7a980733450813b1289e032f83684784d00cf3a206786c427338d511530a349c066cd1a098cc42f1cd86cec8b54220f061a953d7a1f882ca7c2b465ae636e43e609b88c125327868dbd2851481f4b19a3dbf147235c7e59a7bcc1c883459d355d280705572a10a7fd81c3465380776f77d9058dbbfe91f2ddb694d5c1aae8198c9038265aaf88de90e0b1a0a2ac6796a48da6d30c821b4eddc4f64102460f57c48f49940c086261c9751d160797f4b55149061be80da98ab44d67645226663b910cff393e3bb03d681594433960149ccd453b269ea0d97490b162a3c30bff85d6a46526a035fbd075911e833b94a7513d3669e9d9727a5a01fa427d6c5cbc49d0f90fa1eba32a45969dacbe11e9d8a4403bf7c46670c38e15eaa18e35a6dc32d1f0d16cb4175dbffd03f4df5743d5fdb1bd4221e78c431d2ce9517066dc17406a40034f615cbf0408f9d77b8755ae4f4be477f23f826e3dab77568594d1e99307d063d19a20d3366c5bc7fa82be029a2fd04d8c17cd1a04f20017dd5a872ed9d5c952015dbfa7b2daa7aa3eae2df446017a937e2355347fd96d7c28779cea5f840b6f938826f17d7e485b6e11384aedc7f1262ce25268422931af2521b24ed5ad0d3c77afd5c2560898152523663e2444cdeda769d324f31ea4ca4b5c6c98b4526c19a53a84c24aa54e6390bef01e42258a90bb1fa5b51cbd8394bf103f3768d908befbe8c9dccf7f61b5c42e3f35cd664885adfae1cf75ab6893b9e1eb24488d805881ca3cae22c89d6b68ec7ed24250233f1a7e115c38ddf1ae6a448d336f310a2eecbb8dc89b1b6657222448061f7545c914b5f7fedc2fb3a34ff22b7155f8dc57bc52c0cd80c79bba5ecc294a2693d70a843910e4fa79e9bcdd2b25f7d2f0ecfa4708dbec26ed5efc93218c8624f47af6dc10e5ec5f758f1d58a21c71da5fca06a5d15aebb22cf1bec447c2a68e2b754292fff680a92a3000deb3be6da805def68d57030a55d3ec7802a59921c6aea28ae87631c8901cad6dd6c00b8fcac47cf44856f2a1c5e3d0556ce7c4033d42093f263745d3901f9b9f65e6ce47d2c17f1eacc382178e81ca999c4714e498a1ef1496f99254910cd6c617fa946ad6da5581c3d9bb2f378b4fbbcd19f677f19dc8a6f722a3a13ee42b413e64dbf4b8f6c559ef5069f1c1c9ec74da0efbee6095aae3f86f35d7da956dd3c37ee091d70884e7b4b7d03d9569dc61b539cacfc191e090ce2d265ee36b7929eff5986c2c177533ceab96d0d1fe6ec914210113a980431ee1d35bf919003edf536f48ccf074f7ca6838cfe9f5594d0a94ae506bbdcec7cc46284f989739838753a62155be6e8f46ecb3c33cecf4f22a839cc6489d78435b1e5a61080c65ebb9d289d472f78000a3e8a81df4a337b6ec1c04c451914557fb17ad8b627b235008cd09c2138748a1acb74d28c341e86b09a09e31ac1fd3f7ac00ff2bc440b030ffcb5e95ea8195de56c46cbbf86d29220be97e28c8bfa4c80ceb970ebe4ddc458b1829b2bada5da77dd17bf4fe567d47cbf02e732e2a33877069951586af556eab95194654c7795496dcc24bf5473c5b2201f2b4adf82f8e22d2a68745e8fdfd8653905e135d41fa726afacb491770d6d2165ed7eabc5f569fb1d007dfaed39cd90d91646054b3bf3fda6fabf7047f6750f3ab655842364e0c706037ac19a8fc9cfcc02fb6548a16842f06e5d06022e3d2438cf057f98569138ffda8bdb6d6b1cf55b98499398a729a63ea4697e56b627eeb5f1009777286ecc4ce847d6a32551f8e38769ea16b4bfddc62893d8f7ce224408fa0503f0c9b349cbdddd1ed71e949bd5f0bd9b1eeca74f3040981982d3833a564706c992410b6ccf6355c151a9708cbf50de38d3c990053ee38c4921e21b272dc3cfffcd39ccda5274f950df20cadb2be7655efa9522443ebac940869ff0ae2b9fddef6a69deb907f16dcf22e02631ca66d8b784da1420c9dd5bec128b9caa05a185fa115e8f1950eabfa2d42b20536e25390d171a945f01bc1c9a99b5876e7f97fd505ffa7a79f0037769c62532adfd43d4c50d71e02c4509dcd15e61aa1c6c79fe148451ad4a14555d94bd95cd3c7ebe91c6f6ec927bf16de8abc159fd5f056cd3e297c99547dbfd35fa8243ab5ee242c008e6f3cef1594b879c6a73cf9bdee94245d792792161bfb1067030445ca71d56ecece5377f85ffacad6efac7cd6739799420539e8cf641c05e773e70acd79d777fca9d7f96eeafad893dc06a30d8056af28d527a0addf40b3e7f226eebc44ffb4489e70541addea917d68fbbd3be45a8629d74563236fbfed544959ba5988948f64d4fd52584c7784062439fbe1456f1d20304a9cd90b4c139b16b3d1f46304e2ad4883ca7d99fcf277750ea233ba108dc458f202db0592612f0836fd802e5e474e5a968479eaf58eb2e794551d8482356bef09f0a94b9686cb036c6e4224daed2342b775df7c9e7d4a12ab6332afc6a56bc60e8b07c6e68d5e58fe9d6754c711f1d8bc73b429b6e7df0f852e61437c7e46cc7bad5f4d30c222b33429b9dd94f8be73fd46990bec5b435ae547d2bac9cef427e1d375911da19188bf02265b1cd123c4af9dc305fbf17149f2c269dd835efa73869cc7e358550ae8eb94eb842f080a74c30413271cd020da26777e6c953eb0d3d30d11f8afd81366a2b91c47be1c64f44c48673ce1481a8c8cff1ed9e53db3859bca588d988c9e9d2cf5e0ef28fc49c940ae7b11cfee31bcc926ae2152f1c64a1628e1cd3f0af47412c160aa1ff037268d45fe7799aadb2e0329a78e0d44eddc4626f390c7f7bcb54aa0fb8b000a731d31068e7efa67bf74de1cb86a747bf30c345c847b66cbb00c27e25596309827050bfe96d9908018b6cfd696e729cd1199804b73fb90435a222a5502ae8fdd4564df3ffdfd1a46a83d650ae159cedd4dd958ae9bfee53834902ead33bbd7393dcd5fa0fa442bc9c7215eaf68f399365dcd191d5da6659425ac0fd0e685ee01be2762ac21706d2efc47d2a9737fa88c813206e9101e3783e3252fe0e943cb540d045bcb6d0cb376b7cfe3793cb3e10011aedd1bac7342d8cbf1974a78f651e1e78b8efab543663c5895303a86479e51c17179ee8dcbd5b7d058ab856badd5ab90469e2106cc5eac63f0315ea5cb2049c77c89b0a5ae64ede434d85cb23c1d7229eb2eae637b14ce2be6a12bf66a98303acdaa0a11da92958e6346c27fbd5d21c486d6a1e6817dee30cebe6bac661404f12907d6f4394abf885fa44004e52e7827a81e0a36798a533aee8747d994d3fbbc4f55887b9473d55a149bb72fcc36e21ff54f281b2a6c3f4ad003614cfa6132ff3c486767e0c17a12c5cec60420158b1f0a30cd37149e34a3aaca6124530434de39d4b1f952429fd230619c87087866f07e88aff50c798aeec87cf2aba312bf8beee7d16c8abe550f66c219d4498504c4b14ca021a874b422ceb3f127fc454c557e1856de0d987115342a1bbeb54f98d694758d159aac0691f6c019e200dc967f6343a019a694621316a94d9653d7953e13c4f0ed96e67f6a6123f736a779c0f7b5b5773c0bf7b35b48ec921b2f56e1f98b7c252be1b8d4424799f4e3d2bf136beaafb86f158c626243802f05bc665b2b8e6ef65e8de415dd9b894bde023a1c447dcf119afe613718759f72c2e99f5708ed55e407760c235a28315411a44839fe5451d39381e62c3b72b268f78d9288380b3aef30f870ea30e29c65bd3dfd3724af55b4c8d757e856de0fdd0fb4304999ad69d2af0398eacd473b52e645d5b630492d149eda34ae2b0d75b0be72dc408ceb8fd215884485866e162b0d7d8fd2d1dddeaa56873caa50229faa87160e0373c81a49c74b2c94b8e7ed9d9b6731c0dadd8d95ab5d2e8f3bb1e7b96dad64d9aadb3eb0bcdd1d5c31f69fd5f18763e9341b3f6174207fb27101bbacfd8889515c76a06aba923850589b8372e9a97128536369f9f0f1a9993cedcd0", 0x1000}, {&(0x7f0000005ac0)}, {&(0x7f0000005b00)="a0ba684cdc1f05293a225ea26063dc7b53f04a4c37bd84ab5e83b87eb7453f7731c328cbfbc8d2dc9a185ed6b29da24b2f767ce9a0b8a96a0faa1116ec61cb0c5064855116026eaf9de6edf1b8293a14fd22f187ba7f939d532915aeba624df32a98c2e433a82d6de15d961e3affc98ff25e57722e8e30f68fe6b1f2d27f5bb8f71384f0b098f8e2e7ec2bb1fa5db8cc552e7b2e702674b55241a5b2308aeed0", 0xa0}, {&(0x7f0000005bc0)="ee4bbe0452a93c3fd8b5aec3d588a139c09db0ec52a84649613ce324f538d82a224d80d57b8b4935c706cf0b882acab3b7b322cb2f400742f869c28aa70cb5109e8e4927134f2e3a942d4eecf74cd8e7853135d9482a7322839425", 0x5b}], 0x8, &(0x7f0000005cc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_retopts={{0xf8, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x1c, 0x80, 0x3, 0x6, [{@broadcast, 0x109}, {@broadcast, 0x3}, {@remote, 0x1}]}, @rr={0x7, 0x7, 0x70, [@loopback]}, @cipso={0x86, 0x28, 0x3, [{0x2, 0x2}, {0x0, 0x5, "7608d6"}, {0x2, 0xb, "8e41b3566ae1200463"}, {0x0, 0x10, "100a384f7ea929e54348a9f8a430"}]}, @timestamp_addr={0x44, 0x14, 0x9e, 0x1, 0x8, [{@remote, 0x1f}, {@multicast1, 0xf0}]}, @timestamp={0x44, 0x14, 0x88, 0x0, 0x6, [0x2, 0xea7, 0x101, 0x181c]}, @rr={0x7, 0x13, 0x71, [@rand_addr=0x64010100, @multicast1, @private=0xa010100, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x98, 0x1, 0x5, [{@private=0xa010100, 0x2}]}, @generic={0x94, 0x7, "8468334c51"}, @lsrr={0x83, 0xb, 0xf4, [@multicast1, @multicast1]}, @timestamp_prespec={0x44, 0x44, 0xd6, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80000000}, {@local, 0x101}, {@empty, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80}, {@loopback, 0x5}, {@remote, 0x6}]}]}}}, @ip_retopts={{0x78, 0x0, 0x7, {[@rr={0x7, 0x23, 0xeb, [@loopback, @empty, @remote, @remote, @private=0xa010100, @private=0xa010102, @rand_addr=0x64010101, @remote]}, @timestamp_addr={0x44, 0xc, 0x7f, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x16}, 0x4}]}, @rr={0x7, 0x1b, 0xc8, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast2, @empty, @loopback]}, @ssrr={0x89, 0x1b, 0xe6, [@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @private=0xa010100, @multicast1]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0xc, 0x4a, 0x3, 0x6, [{@broadcast, 0x6e8}]}, @rr={0x7, 0x3, 0xfb}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x248}}], 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000e000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1106.574537][ T25] audit: type=1326 audit(4294967598.841:9413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11539 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:19 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000b80), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x7c, r2, 0x401, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:tmpreaper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}]}, 0x7c}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x80) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x3}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x11}, 0x40) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{}, {0xa4, 0x2, 0xfe}, {0x6, 0x1}, {0x6, 0x3f, 0x0, 0xffff6699}]}) [ 1106.839091][ T25] audit: type=1326 audit(4294967599.099:9414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11563 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000010000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:21 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x2}, {0xa4}, {0x5}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000200)={0x0, 0x0, r0, 0x5, 0x80000}) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x202, 0x41, 0x3}, 0x18) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x9, 0x20, 0x5, 0x8}, {0x401, 0x81, 0xcd, 0x3}, {0x81, 0x80, 0x7, 0x9}, {0xded, 0x1, 0x2, 0x800}, {0x2, 0x80, 0x20}]}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x0, 0x2, 0x81, 0x4}, {0x1, 0x6, 0x0, 0x7ff}]}) 06:33:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:21 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) recvmmsg(0xffffffffffffffff, &(0x7f0000006480)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)=""/45, 0x2d}], 0x1, &(0x7f0000000500)=""/204, 0xcc}, 0x6}, {{&(0x7f0000000600)=@caif, 0x80, &(0x7f0000000840)=[{&(0x7f0000000680)=""/231, 0xe7}, {&(0x7f0000000780)=""/170, 0xaa}], 0x2, &(0x7f0000000880)=""/249, 0xf9}, 0x1ff}, {{&(0x7f0000000980)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a00)=""/230, 0xe6}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x2}, 0xffff}, {{&(0x7f0000000b40)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000bc0)=""/225, 0xe1}, {&(0x7f0000000cc0)=""/149, 0x95}, {&(0x7f0000000d80)=""/63, 0x3f}], 0x3, &(0x7f0000000e00)=""/85, 0x55}, 0x8}, {{&(0x7f0000000e80)=@nfc, 0x80, &(0x7f0000001000)=[{&(0x7f0000000f00)=""/211, 0xd3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2, &(0x7f0000001040)=""/74, 0x4a}, 0x3ff}, {{&(0x7f00000010c0)=@isdn, 0x80, &(0x7f0000001540)=[{&(0x7f0000001140)=""/192, 0xc0}, {&(0x7f0000001200)=""/24, 0x18}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/253, 0xfd}, {&(0x7f0000001380)=""/251, 0xfb}, {&(0x7f0000001480)=""/168, 0xa8}], 0x6, &(0x7f00000015c0)=""/84, 0x54}, 0xbe}, {{&(0x7f0000001640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000037c0)=""/230, 0xe6}, {&(0x7f00000038c0)=""/4096, 0x1000}], 0x2}, 0x6}, {{&(0x7f00000048c0)=@alg, 0x80, &(0x7f0000001700)=[{&(0x7f0000004940)=""/84, 0x54}, {&(0x7f00000049c0)=""/187, 0xbb}], 0x2, &(0x7f0000004a80)=""/254, 0xfe}, 0xfffffffe}, {{0x0, 0x0, &(0x7f0000006040)=[{&(0x7f0000004b80)=""/157, 0x9d}, {&(0x7f0000004c40)=""/123, 0x7b}, {&(0x7f0000004cc0)=""/30, 0x1e}, {&(0x7f0000004d00)=""/183, 0xb7}, {&(0x7f0000004dc0)=""/4096, 0x1000}, {&(0x7f0000005dc0)=""/184, 0xb8}, {&(0x7f0000005e80)=""/140, 0x8c}, {&(0x7f0000005f40)=""/247, 0xf7}], 0x8, &(0x7f00000060c0)=""/91, 0x5b}, 0x20}, {{&(0x7f0000006140)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f0000006340)=[{&(0x7f00000061c0)=""/133, 0x85}, {&(0x7f0000006280)=""/39, 0x27}, {&(0x7f00000062c0)=""/69, 0x45}], 0x3, &(0x7f0000006380)=""/228, 0xe4}, 0x8}], 0xa, 0x100, &(0x7f0000006700)={0x77359400}) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x3, 0x0, 0xff}, {0x64}, {0x206}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:21 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0xc4, 0x6, 0x3, 0x80000001}, {0x401, 0x0, 0x40, 0x4}, {0x20, 0x57, 0x80, 0x80}]}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 06:33:21 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ftruncate(r2, 0x8) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r4 = socket$inet6(0x10, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r7, 0x0, r8) fcntl$dupfd(r6, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="ac1414aa0000000001000000090000007f000001ac14140b00000000ac1414227f000001ac1e0001e0000001ac14142ee0e5f387b861ace5e9541ad7000001"], 0x34) r10 = open_tree(r0, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r10, 0xc0182101, &(0x7f0000000200)={r9, 0x2, 0x1}) 06:33:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x0, 0xfc}, {0xa4, 0x0, 0x0, 0x9}, {0x6}]}) [ 1109.266958][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 1109.266971][ T25] audit: type=1326 audit(4294967601.511:9416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11574 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1109.339397][ T25] audit: type=1326 audit(4294967601.590:9417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11595 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1109.373017][ T25] audit: type=1326 audit(4294967601.610:9418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11603 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2000000000000291, &(0x7f0000000000)=[{}, {0xfff7}, {0x6}]}) 06:33:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000018000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_procfs(r0, &(0x7f0000000000)='mountstats\x00') [ 1109.505735][ T25] audit: type=1326 audit(4294967601.749:9419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11625 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1110.172247][ T25] audit: type=1326 audit(4294967602.414:9420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11595 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1110.346294][ T25] audit: type=1326 audit(4294967602.583:9421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11625 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000001c000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x80, 0x1f, 0x400}, {0x7, 0xff, 0x6, 0xf61}, {0x7fff, 0x1, 0x0, 0x6}, {0x1, 0x7, 0x3f, 0x5}, {0x4, 0x5, 0x1, 0x3}, {0x2, 0xb2, 0x3, 0x8}, {0xffff, 0xfd, 0x7, 0x40}]}) 06:33:24 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000280)={0xffffffffffffffff, 0x1, 0x8, 0xfff}) r5 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x20, 0xff, 0x3, 0x23, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x40c8, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, r4, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:24 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x454000, 0x111) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000000c0)={0x0, 0x0, r0, 0x53}) 06:33:24 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v2={0x2000000, [{0xd3de, 0x4}, {0x2, 0x1}]}, 0x14, 0x0) [ 1112.314664][ T25] audit: type=1326 audit(4294967604.538:9422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11658 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1112.346029][ T25] audit: type=1326 audit(4294967604.558:9423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11657 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1112.383113][ T25] audit: type=1326 audit(4294967604.567:9424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11660 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000026000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000fe000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004020000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000030000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000002040000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:25 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 1113.153893][ T25] audit: type=1326 audit(4294967605.371:9425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11658 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:27 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x1, 0x5, 0x0, 0x8001, 0x82000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x6, @perf_config_ext={0x8, 0x5}, 0x40d0, 0x10000, 0xfff, 0x1, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x101000, 0x1) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x4442) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) pidfd_getfd(r0, r1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0xfffb, 0x5, 0x1f, 0x8}, {0x7, 0x0, 0x40, 0x8}, {0x100, 0x1, 0x3e, 0x8}, {0x3, 0x20, 0x0, 0x800}, {0x9, 0x40, 0x0, 0x2cc9}]}) creat(&(0x7f0000000000)='./file0\x00', 0x102) creat(&(0x7f00000000c0)='./file0\x00', 0xe1) 06:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000006040000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000ffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1115.372969][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1115.373028][ T25] audit: type=1326 audit(4294967607.574:9428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11807 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000ffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000ffffffff000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1115.419940][ T25] audit: type=1326 audit(4294967607.624:9429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11812 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000080040000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1115.512002][ T25] audit: type=1326 audit(4294967607.713:9430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11847 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000050000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000002b050000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1116.209845][ T25] audit: type=1326 audit(4294967608.398:9431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11807 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1116.244161][ T25] audit: type=1326 audit(4294967608.428:9432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11812 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000060000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:30 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000280)=0x6, 0xff) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:30 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/74, 0x4a}, {&(0x7f0000000180)=""/154, 0x9a}], 0x2, 0x8559, 0x1000) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x1, r1, 0x650}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x5000054) 06:33:30 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 06:33:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1118.428934][ T25] audit: type=1326 audit(4294967610.611:9433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11927 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:30 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = dup(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) [ 1118.463462][ T25] audit: type=1326 audit(4294967610.631:9434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11929 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1118.501505][ T25] audit: type=1326 audit(4294967610.681:9435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11946 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004060000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000070000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000e0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000180000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:31 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file2\x00', 0x141042, 0xd8af5aa6e48bab30) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0xb, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) splice(r1, &(0x7f0000000240)=0x7, 0xffffffffffffffff, &(0x7f0000000280)=0x3, 0x8, 0x8) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 1119.268797][ T25] audit: type=1326 audit(4294967611.445:9436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11927 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1119.341019][ T25] audit: type=1326 audit(4294967611.514:9437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11946 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000001c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:33 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f0000000240)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:33 executing program 0: link(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000100)={0x0, 0x101, 0x400}) 06:33:33 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000000)=""/212) r6 = socket$inet6(0x10, 0x2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) r11 = fcntl$dupfd(r9, 0x0, r10) fcntl$dupfd(r8, 0x0, r11) ioctl$SG_GET_LOW_DMA(r8, 0x227a, &(0x7f0000000100)) 06:33:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1121.483121][ T25] audit: type=1326 audit(4294967613.638:9438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12069 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000000)={0x0, 0x1, 0x5}) [ 1121.511398][ T25] audit: type=1326 audit(4294967613.658:9439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12067 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1121.547453][ T25] audit: type=1326 audit(4294967613.698:9440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12085 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000260000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000052b0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000003f0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000004800000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:34 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) socket$inet(0x10, 0x80003, 0x0) write$binfmt_elf64(r3, &(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000fffe0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000feff0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:34 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:34 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f0000000180)={0x0, 0x2, 0xf44}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x295, 0x0, 0x3, 0x1}, {0x7, 0x8, 0x40, 0x97a}, {0x2, 0x39, 0x40, 0x3}]}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000240)={r7, 0x1, r3, 0x8000, 0x80000}) [ 1122.321480][ T25] audit: type=1326 audit(4294967614.472:9441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12069 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:34 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1122.377365][ T25] audit: type=1326 audit(4294967614.521:9442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12214 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1122.413450][ T25] audit: type=1326 audit(4294967614.561:9443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12085 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1123.218065][ T25] audit: type=1326 audit(4294967615.365:9444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12214 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:36 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f00000000c0)) r6 = syz_open_dev$sg(&(0x7f0000000140), 0x846, 0x10002) r7 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) fcntl$dupfd(r6, 0x406, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='\\\'(-\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0xf8) 06:33:36 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000c00100000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:36 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRESOCT=r1, @ANYRES16=r1], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x33, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:36 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r2, 0x0, r3) fcntl$dupfd(r1, 0x0, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0}) r6 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000340)={r5, 0x1, r6, 0x200, 0x80000}) r7 = signalfd(r0, &(0x7f0000000000)={[0x6]}, 0x8) fcntl$setpipe(r0, 0x407, 0xb7) r8 = socket$inet(0x10, 0x80003, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r7, 0x8004f50e, &(0x7f0000000280)) sendmsg(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r8, 0xc020f509, &(0x7f0000000240)={r7, 0x2, 0x796, 0x1f}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f00000000c0)) r9 = accept(0xffffffffffffffff, &(0x7f0000000140)=@qipcrtr, &(0x7f00000001c0)=0x80) setsockopt$inet6_tcp_TLS_RX(r9, 0x6, 0x2, &(0x7f0000000200)=@ccm_128={{0x304}, "b4737bd02add9206", "317ca131128fd3867d02b21d4ddc7c6e", "48d5a090", "651839dff69a9c0a"}, 0x28) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1124.544938][ T25] audit: type=1326 audit(4294967616.685:9445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12246 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1124.576549][ T25] audit: type=1326 audit(4294967616.705:9446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12244 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:36 executing program 5: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x443c2, 0x0) r1 = perf_event_open(&(0x7f0000001740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x22fa3168c71d4062) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x5) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="6a5d434190dea7c6f8f8a374ec15158d77287d9563293a69124a1bd2db29df37747761f86b512e062c6547bac60d5208e86b03333fc7259cc8a08ae8dd3622ff930e0eff1d32b59162b32d1527620a6af3011bad27caf753e8f28c93c5c28eb6fb5c410ee1ba869460a0d19c7f561dc34d5ba966b889f0d314c7b6bd4b0841875cc0e6dc0cd527331e88d00f4274e4ecd816a8765ae4055b7215c78a84ce1c9b2c857ca7361095800172df5e8d67d713dbb40d4ff01ee5c96794c1f04550ae19bcad9f718eecc135f63aef67c5236c5da540c3a7874c1a697318f4dea3dcb108e9c51af062c8862eba5d63a9", @ANYRES64=r0, @ANYRESOCT=r0], 0x82) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x20, 0xff, 0x3, 0x20, 0x0, 0xf2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x8, 0x4000000000000000}, 0x40d0, 0x10000, 0xfff, 0x3, 0x5, 0xe1, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0x82) open(&(0x7f00000000c0)='./file0\x00', 0x442500, 0x30) sendfile(r3, r2, 0x0, 0xa198) close(0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 06:33:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:37 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x100, 0x2, 0x0, 0xffffffff}, {0xa4}, {0x6}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) 06:33:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1125.384921][ T25] audit: type=1326 audit(4294967617.508:9447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12246 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:37 executing program 0: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6, 0x0, 0x0, 0x10000000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x8, 0x6, 0x9, 0x78d}, {0x3, 0x80, 0xf9, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000140)) 06:33:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0xa4}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x200, 0x0, 0x0, 0x60e3}, {0xa4}, {0x6}]}) 06:33:39 executing program 0: connect(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @local}, 0x4, 0x2, 0x0, 0x1}}, 0x80) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x7fff, 0xc0, 0x1, 0x1}, {0x8, 0xf9, 0x1, 0x6}, {0xfff, 0x4, 0xc5, 0x80000000}, {0x400, 0x1, 0x9, 0x1}, {0x2, 0x4, 0x6, 0x1000000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000040)={r1, 0x1, 0x3ff}) 06:33:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000040000800000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) gettid() 06:33:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0xa4}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) [ 1127.646588][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1127.646601][ T25] audit: type=1326 audit(4294967619.751:9450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12358 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0xa4}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1127.706104][ T25] audit: type=1326 audit(4294967619.811:9451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12371 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x0, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x0, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1128.486711][ T25] audit: type=1326 audit(4294967620.595:9452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12358 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1128.547274][ T25] audit: type=1326 audit(4294967620.654:9453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12371 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x0, 0x0, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000001000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:42 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) r6 = open_tree(r2, &(0x7f0000000000)='./file0\x00', 0xc0003) getpeername$unix(r6, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:42 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$FIOCLEX(r1, 0x5451) clone(0x662bf5e5a922007a, &(0x7f00000000c0)="6c9f72ed6c8d7531809203acbec8f5d39ffc9c4e90c07f1496788a33da76e4054aae3c0a46d288bef79c1a68d804b4ec766c5e9928722e3a2642ebb8deeb382a84be", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="2a3e9599e60c0bc8") r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000200)="afae41a002e1f16d912903916974d5d53a148ac00defaa903914be23915d3aec5860c4ab87fe3d893d88a61ec33e66179dc78ce03f166b9c776a99422d0e1912e62a4b8411d5e9fad687f18c340225f55fd2e4ba49d0cde8bf8da7f519936ad8eeec", 0x62}], 0x1, 0xf292c3de190d68cb) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x3, 0x71, 0x0, 0xffffffffffffffff, 0x9, 0x81}) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f00000002c0)='\xd6\x00', &(0x7f0000000300)='./file0\x00', 0xffffffffffffff9c) [ 1130.671597][ T25] audit: type=1326 audit(4294967622.758:9454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12398 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1130.707305][ T25] audit: type=1326 audit(4294967622.778:9455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12400 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1130.749380][ T25] audit: type=1326 audit(4294967622.828:9456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12414 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000001c000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) 06:33:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) 06:33:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000001000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) [ 1131.512311][ T25] audit: type=1326 audit(4294967623.592:9457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12398 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1131.548276][ T25] audit: type=1326 audit(4294967623.612:9458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12400 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000002000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:45 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = fcntl$dupfd(r3, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r7, 0xc0182101, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:33:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = fcntl$dupfd(r2, 0x0, r5) getsockopt$inet6_int(r6, 0x29, 0x51, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fork() r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r11) sendmsg$netlink(r8, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r9, 0x0, r11}}}], 0x20}, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, r11, 0x400) 06:33:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1133.740127][ T25] audit: type=1326 audit(4294967625.805:9459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12517 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1133.770637][ T25] audit: type=1326 audit(4294967625.835:9460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12519 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1133.803911][ T25] audit: type=1326 audit(4294967625.835:9461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12518 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000402000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000003000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1134.579608][ T25] audit: type=1326 audit(4294967626.629:9462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12517 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1134.619190][ T25] audit: type=1326 audit(4294967626.658:9463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12518 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000004000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x100) close(r0) 06:33:48 executing program 0: r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) r1 = shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmdt(r1) shmdt(r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64, 0x0, 0x0, 0x2}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:48 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={r1, 0x1, 0xffffffffffffffff, 0x2}) [ 1136.821981][ T25] audit: type=1326 audit(4294967628.861:9464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12646 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1136.883534][ T25] audit: type=1326 audit(4294967628.901:9465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12648 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1136.907419][ T25] audit: type=1326 audit(4294967628.921:9466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12671 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000005000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000006000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1137.664402][ T25] audit: type=1326 audit(4294967629.695:9467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12648 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1137.723790][ T25] audit: type=1326 audit(4294967629.755:9468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12671 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000406000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) clone(0x0, &(0x7f0000000000)="10ef9510fe01d3f3", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="6ecbfeba2a75e24ebfaa6d96857f1d67113ba1ce7be8cd8272463fe3f94923b6596e87df30683604d8c9106b") 06:33:51 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x1}, {0x64, 0x0, 0x0, 0xfffffffc}, {0x1006}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r1 = socket$inet6(0x10, 0x1, 0xfffffffc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x88000, 0x0) fcntl$dupfd(r7, 0x406, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)) 06:33:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1139.887470][ T25] audit: type=1326 audit(4294967631.898:9469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12769 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:52 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1139.937836][ T25] audit: type=1326 audit(4294967631.938:9470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12771 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x1000, 0x3c, 0x6}, {0x81, 0x0, 0x28, 0x7}, {0x4, 0x40, 0x0, 0x1}, {0xffff, 0x20, 0xfc, 0x6}, {0x0, 0x1}, {0x3, 0xff, 0x7f, 0x401}, {0x9, 0x0, 0x0, 0x5}, {0x9, 0xf8, 0x3f, 0x9}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={r3, 0x1, r1, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000001c0)={r3}) r4 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000001c0)={r3, 0x1, r4, 0x4}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x244800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000000c0)) 06:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1140.028200][ T25] audit: type=1326 audit(4294967632.037:9471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000007000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000008000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1140.721389][ T25] audit: type=1326 audit(4294967632.732:9472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12771 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa}, {0x6}]}) 06:33:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000000e000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1140.758251][ T25] audit: type=1326 audit(4294967632.772:9473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12908 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:52 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) prlimit64(r0, 0xd, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x9, &(0x7f00000000c0)=[{0x80, 0x81, 0x80, 0x7}, {0x5, 0x9, 0x80, 0x6}, {0x9, 0x20, 0x20, 0xffff}, {0x2f43, 0x2a, 0x7, 0x40}, {0x5, 0x2, 0xb5, 0x1ff}, {0x7ff, 0x0, 0x0, 0x2}, {0xc69b, 0xfe, 0x9, 0x103}, {0xfffb, 0x0, 0x6, 0x885}, {0x81, 0x1, 0x5, 0x4}]}) 06:33:52 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f00000000c0)) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x1}, {0xa4}, {0x6, 0x0, 0x0, 0xa2}]}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x1) write(r0, &(0x7f0000000100)="173b26c312e18dc6f83edb4dce1ebef66f0fdf7c1c842618d6d235731dc679317545d19d4e3f65a197f1b1ca52d90f6f317c62b1c1a0f81eaaddffcc1597b4a3dfb850690fbdaf600224e4f2688dd639746b68cc34dbc344da050c1abb357448b162ebda2a83c6356d0e755aa9a4e536af15e8699c634f2e4852a752e41904d7da6c6b08b8810cbac41fc20f", 0x8c) [ 1140.869489][ T25] audit: type=1326 audit(4294967632.881:9475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1140.907029][ T25] audit: type=1326 audit(4294967632.881:9474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1140.932269][ T25] audit: type=1326 audit(4294967632.901:9476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1140.971626][ T25] audit: type=1326 audit(4294967632.901:9477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1140.996334][ T25] audit: type=1326 audit(4294967632.901:9478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12813 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:33:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x0, 0x0, 0xfffffe00}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000018000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f00000000c0)="887b62a7c802cf1f5875d3dfc9ce4c8e4cfcfc97a51b75426dc2e23c6efde564f48c1511093897235e4bee28db72a9796ab4d8497061711f119ebb77c5c02fbaf2f7510e1c0a5871c13aa588bf8ac5be2ba10ab1cbe71f8b80160725b3fe9f7fa4e3799508e67e7efabc19d84f169235ffa85029ba5dd568db889872a0fb7223be1cc3c77a1df2edba2343fa9fc7075566fe66f192398696536b26c45d163297c215777c37fd12761a596d7e4f7c76dbf754fce4274a18fa364456d9484e51", 0xbf) r1 = pidfd_open(0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x212202, 0x12) splice(r1, &(0x7f0000000000)=0x4, r2, &(0x7f00000001c0)=0xbc9, 0x1, 0x1) 06:33:55 executing program 0: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x53}, @void, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x37}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040810}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000001c000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000026000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:33:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000052b000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:33:58 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x4, 0x0, &(0x7f00000002c0), 0x1100000, &(0x7f0000000300)={[{@abort}, {@quota}, {@data_ordered}, {@noauto_da_alloc}, {@nouid32}, {@errors_remount}], [{@subj_type={'subj_type', 0x3d, '\xbc'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_gt}, {@uid_lt}, {@obj_role={'obj_role', 0x3d, '*]'}}]}) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={r2, 0x0, 0x4}) 06:33:58 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa8}, {0x6, 0x1, 0x8}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000140)={r2, 0x1, r0, 0x0, 0x80000}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f0000000280)={&(0x7f00000001c0)=""/148, 0x94}) 06:33:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{0x4, 0x72, 0x8, 0x1000}, {0x0, 0x7, 0x2, 0x10001}, {0x4, 0x0, 0x1, 0x7}, {0x8, 0x7f, 0x4, 0x8}, {0x5, 0x10, 0x0, 0xffff}]}) [ 1146.110632][ T25] kauditd_printk_skb: 69 callbacks suppressed [ 1146.110683][ T25] audit: type=1326 audit(4294967638.081:9548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13091 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1146.165405][ T25] audit: type=1326 audit(4294967638.130:9549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13092 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1146.193812][ T25] audit: type=1326 audit(4294967638.160:9550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13109 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:33:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf00000000000000003f000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:33:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000080040000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1146.948867][ T25] audit: type=1326 audit(4294967638.914:9551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13091 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1147.033827][ T25] audit: type=1326 audit(4294967638.994:9552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13109 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000480000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:34:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64, 0x0, 0x0, 0x4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x3f, 0x4e, 0xee, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000000c0)={0x0}) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e21, @empty}, 0x10) r7 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000140)={r6, 0x1, r7, 0x8, 0x52d1f215b75c55b}) 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1149.165620][ T25] audit: type=1326 audit(4294967641.108:9553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13229 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x36) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x36) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:34:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x36) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 1149.200628][ T25] audit: type=1326 audit(4294967641.137:9554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13230 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1149.225134][ T25] audit: type=1326 audit(4294967641.137:9555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13231 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:01 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000fffffff6000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:01 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) [ 1150.004986][ T25] audit: type=1326 audit(4294967641.941:9556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13229 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0x0, 0x20}, {0x64, 0x0, 0x4}, {0x7, 0x0, 0x1}]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x12f100, 0x0) r1 = timerfd_create(0x2, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={0x0, 0x0, r1, 0x10000, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:02 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000000c0)={0x0, 0x7ff, 0x7, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000008c0)={0x4, 0x4, {0x52, @usage=0x3, r1, 0x3, 0x7, 0xeb0, 0x8, 0x9, 0x0, @struct={0x0, 0x1800000}, 0x3, 0x1f, [0x1, 0x2, 0x7, 0x9, 0x8, 0x1]}, {0x0, @struct={0xcba6, 0x3}, 0x0, 0x100000001, 0x1000, 0x6, 0x1182, 0x55, 0x0, @struct={0x4}, 0x10001, 0x7, [0x6, 0x8, 0x0, 0x38284455, 0x9, 0x80000000800000]}, {0xe28, @usage=0x100000000, 0x0, 0x100000001, 0x3, 0x5, 0x400, 0x6, 0xa0, @struct={0x4, 0xfffffffc}, 0x5, 0x200, [0x7f, 0x7, 0x6, 0x4, 0x1d2d, 0xee0]}, {0x7, 0x9, 0x7}}) 06:34:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:02 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000fffffffe000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1150.043704][ T25] audit: type=1326 audit(4294967641.981:9557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13231 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:02 executing program 0: add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="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", 0x1000, 0xfffffffffffffff9) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:02 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000f6ffffff000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:02 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:34:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x7f, 0x5c}, {0x84, 0x3f, 0x8, 0x1}]}) 06:34:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000feffffff000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x1500, 0x0) r2 = pidfd_getfd(r1, r0, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e20, 0x3, @rand_addr=' \x01\x00', 0x6}, 0x1c) sendto$inet6(r1, &(0x7f0000000180)="71be2f03d5d76d638a9bc31f3e16e671168dbd095e5c790825257aab3238dff3794e0805bf4e4af8a5738bd70542c57dc331f135a89df18a59145119082821b40eb7138acd9b38452365aa221e5108b53c935875f9f0820bb241f008188802a0de7546474b1cf44050a7752f5dfa51f477dc4a50864ff80d1c8998b2c960491d709a1db50de82b3bfb81c720c882f8ea70b051c36ad3dc864bca64df3075db4b1022ddb9d661a9c174f85b476f43c7b821b0fbb0033ebb9f6a89f828b6", 0xbd, 0x804, &(0x7f0000000240)={0xa, 0x4e20, 0x1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x10}}, 0xffffffe2}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r3) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @remote}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856", 0x28}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:03 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="a092fc71365888d85d22e1d5e2777a2031f7bef084efa202f755ebb7b9aadfa5c70cd474aee00e3a5ee3c4a8893ea53fe51bcddba53f67e84fe285e65c9a852cd42ee2428b6b1f9ffe258264bcf0cdfaa92a34e3ab6e47643cfbf01d4be95780089d72cde398a83fd0a406105337820af838dbad19238520cf34caf1e2e9e40cb7794199ddf895c026e74698f8051d87e661a873f90842c86b4fd519fd3bd264337cff43413b502afc0c4cd125cd8e5b548dfc267c5a2dbfb5e83dce0117a57ab8fe9efe5b282e24", 0xc8}, {&(0x7f00000001c0)="bd109652809402d997dae06dc9ef3747d4d0d740bfe578a1458d73437b1349b2773cecf29094c81ad327fc3d559ceebf90001d952b23c6176d5b0e822ed7b861edbec9ca22b6cc08940362eaa1bf044c9c2c154698787c6764a48cc88e042c850dc325a013e95fcd2bb5bf8ab298eadbee9880de396ae465d806b8b4cf8e0a4a0648902509c0f95cfcee49bf8fd3b4587398449924c5956fbeca00d6da289353b55cd0a0f68de0edaef5bfe84856fd1395337a1c4341a6872e130f8862717dca5eb0e5de42c56a2eb00607eff4d206b247e085b03c6f7cf9a4d6d047822abe7b052d2366feb6d033f19512b83cbfc2eda3d5", 0xf2}, {&(0x7f00000002c0)="359ec97b81622641e7390cfc93ac472f8daa43849840bd071385659523d1807628f17ccd7123ac4fbd06b946f1540e1748c31a4e5ac6282d4513a18a31ede943a61d7cbfeaa3669d5ff0501f7a0ac65ffab7128bf98580e01522f991b342b754b4bfc30081c53a1fe08e03b78460f0955f020e9c272ff1d3916b3da9b58b82a1592eaada2b2e748da7377e6c209636b6268fcc", 0x93}, {&(0x7f0000000380)="b2cffc2b6a67b36358c69bbd6a935477211cb2b4893aea1264cb1b8485f3ad6c03cd30144b0d5f3b75670361559c8f04fa462c1ba69dd3d8b9015e0e822c6d7bf7d845f66327f83612b370a7acba1c25a7ed1a556a6f38ad805a66a460a4131e34837e1bdbc6ee84a36f9c289d168a3e5189e1c5d340da582a2ecc104be39f0783f675b12beee678b9fea9cf44217c2d00e3ef591e5d9b405967d8d16575d5b4eb189f9220b782c3b9", 0xa9}], 0x4, 0x1) 06:34:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:34:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1151.807656][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1151.807670][ T25] audit: type=1326 audit(4294967643.728:9566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13523 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1151.869072][ T25] audit: type=1326 audit(4294967643.787:9567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13447 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:03 executing program 0: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000280)={0x0, 'vlan1\x00', {}, 0xfff}) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r0, @ANYBLOB="10002cbd7000fcdbdf2504000000640004800900010073797a310000000054000780080003000500000008000300040000000800030003000000080002007f000000080001000f0000000800040005000000080002000700000008000200010400000800020003000000080001000f0000002400098008000200e0ffffff0800020008000000080002000700000008000200fa000000"], 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x28, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x111, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x5}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000002c0), 0xc, &(0x7f0000000700)={&(0x7f0000000300)={0x3e8, r2, 0x800, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x46}}}}, [@NL80211_ATTR_CSA_C_OFFSETS_TX={0x14, 0xcd, [0x7f, 0x6, 0x1, 0x8, 0x7f, 0x5, 0x0, 0x9]}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x8, 0xcd, [0x7f, 0x4]}, @chandef_params, @NL80211_ATTR_FRAME={0x39d, 0x33, @probe_response={@with_ht={{{0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x1}, @broadcast, @device_a, @from_mac, {0x6, 0x195}}, @ver_80211n={0x0, 0x1a27, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}}, 0x1, @default, 0x40c, @void, @val={0x1, 0x2, [{0x1, 0x1}, {0x4, 0x1}]}, @void, @void, @val={0x6, 0x2, 0x4}, @val={0x2d, 0x1a, {0x60, 0x0, 0x1, 0x0, {0x2, 0x1f, 0x0, 0x6, 0x0, 0x0, 0x1, 0x3, 0x1}, 0x800, 0x6}}, @val={0x72, 0x6}, @void, [{0xdd, 0x14, "362ecb13cd784fa2dda6c0a0fb9adb8361999b45"}, {0xdd, 0x40, "49028e97d2bef7c2a65970917475578f673d7eec8cf7a2ab40967fd7230784454460d5f517b2e167b70f678a348d68a9f94771b2c42bd1e3a0fda287f3835276"}, {0xdd, 0x9d, "ed7c7bb64cd6b937d5cf4da16eb35e77f991bc0fe48121950a01e021af7bafd43bc214f66f9e18241cf9b5bf9fa237e7589c03454698676b85a69a4681b17fb8b1ffeb02b25450da8e82cb0c5a4af3523a2c96734098edb56ca27e28685273ab6eeb834a01bce5c9f20169f14c52cd3e618e4fc5c8454cf93bae9549e433fc78da0a581f7fd2eeda313aa4878af2383242115fedc145da6a2cc59e5695"}, {0xdd, 0xf, "8bc986dc489e70dbd3ac1ed893757f"}, {0xdd, 0xd7, "c99f936f9d51681b5a3cc72850ed4671219f4aa7af101404f86d24f8975ab9020e80404c064f4738eb11c58e46baae248c0db449de3ec46860a3c79ea0f4702e83ca17df20df9a2d427d78df1e4b897b5fbee94ce7d8260a55a2e6cf39d0c293fbd1a6d969163db0e0b0ad66eb43a81ae1923084ce79c145f8ee9209b5ea28d79dbfd3eda1811e89bcb3a309567c5d6ebb1b5dea8a0be9ceda1bd1847e16681b9242380cfe335535807922a802a4a37bd1112796484b1759844c21525e631f165042b1295cd86103d93bea72ae3105e05a63f632b03ecc"}, {0xdd, 0x64, "ba8f60aaa1a6c5b0fb1a931b0a38f7cd103ede122f750c77b40cb9d301b4530b9a3372326dea7f5d3f22860d528384e6bc6b65f89fa7bb2e72206e6a54218c242a2356a31c3c39c4d19619e35dda6368fcbdb34fb80e70238cf134b2fa417669d6a983c8"}, {0xdd, 0xfc, "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"}]}}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x3e8}, 0x1, 0x0, 0x0, 0x40}, 0x8090) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0xc, &(0x7f00000000c0)=[{0xc000, 0x0, 0x43, 0x1}, {0x64, 0x0, 0x10, 0x4}, {0x3, 0x0, 0xfd}, {0x1316, 0x5f, 0x2f, 0x366}, {0xefe, 0x81, 0x1, 0x7f}, {0x6, 0x0, 0x5, 0x3}, {0x8, 0x6, 0x5, 0x200}, {0x401, 0xff, 0xc6, 0x3}, {0x3f, 0x3f, 0x0, 0x20}, {0x2, 0x6d, 0x3, 0x20000002}, {0x1, 0xca, 0x0, 0xffffffff}, {0x5d8, 0x6, 0x40, 0x10000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1151.942943][ T25] audit: type=1326 audit(4294967643.857:9568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13467 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6, 0x0, 0x1}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x9, &(0x7f00000000c0)=[{0x1, 0x4, 0xf3, 0x4}, {0x4, 0x81, 0x7, 0xffff}, {0x8001, 0x5, 0x7, 0x7f}, {0x1, 0x1f, 0xfc, 0x9}, {0x7ff, 0x0, 0x6, 0x8}, {0x6, 0x1, 0x2, 0x5}, {0x401, 0x7, 0x1, 0x8}, {0x80, 0x55, 0x7f, 0x2}, {0x5, 0x8, 0xff, 0x81}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) 06:34:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000800000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:04 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) fcntl$setsig(r0, 0xa, 0x18) preadv(r0, &(0x7f0000001600)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/67, 0x43}, {&(0x7f0000000000)=""/12, 0xc}, {&(0x7f0000001140)=""/226, 0xe2}, {&(0x7f0000001240)=""/250, 0xfa}, {&(0x7f0000001340)=""/232, 0xe8}, {&(0x7f0000001440)=""/130, 0x82}, {&(0x7f0000001500)=""/211, 0xd3}], 0x8, 0x8, 0x80) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001680), 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f00000016c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) [ 1152.027838][ T25] audit: type=1326 audit(4294967643.946:9569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13560 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1152.110598][ T25] audit: type=1326 audit(4294967644.035:9570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13574 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1152.865485][ T25] audit: type=1326 audit(4294967644.780:9571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13560 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1152.950413][ T25] audit: type=1326 audit(4294967644.859:9572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13574 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000001000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:34:06 executing program 3: ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f0000000000)) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f00000000c0)={0x1, 0x7, 0x3f}) 06:34:06 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xff, 0x3, 0x6, 0x6, 0x0, 0x4, 0x40, 0xa, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x40000, 0xe2, 0x25, 0x9, 0x3, 0x3ff, 0x69c, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x88, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) socket$inet6(0xa, 0x4, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1c, 0x20, 0x3, 0x80, 0x0, 0x5, 0x4010, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0xc8}, 0xaa02, 0x80000001, 0x3f, 0x1, 0x3, 0x9, 0x6e, 0x0, 0x2d30, 0x0, 0x80000000}, r3, 0xffffffffffffffff, r2, 0x2) [ 1154.153464][ T25] audit: type=1326 audit(4294967646.060:9573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13618 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1154.177878][ T25] audit: type=1326 audit(4294967646.080:9574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13619 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1154.211351][ T25] audit: type=1326 audit(4294967646.090:9575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13620 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000010000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000001c0000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000010000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x3}, {0x64, 0x0, 0x20}, {0x3f}, {0x3, 0x1, 0x2, 0x1}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) fchmod(r0, 0x134) preadv(r0, &(0x7f00000013c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000140)=""/45, 0x2d}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000001440)=""/261, 0x105}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/38, 0x26}], 0x7, 0x3937, 0x6040) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="03810acf9b63f59aee5b49c9b087a77f11d9174629ae96ad1db0a49c4edad781a2fc24f99cb74ca8", 0x28) 06:34:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) 06:34:09 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) setsockopt$packet_int(r5, 0x107, 0xe41476f4840e1e17, &(0x7f0000000000)=0x5, 0x4) 06:34:09 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:09 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) prlimit64(r0, 0xd, &(0x7f00000000c0)={0x7ebd2340, 0x4}, &(0x7f0000000100)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) [ 1157.222826][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1157.222841][ T25] audit: type=1326 audit(4294967649.096:9578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13763 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x2, 0x9}, {0x544, 0x3, 0x40, 0x5}, {0x3, 0x3, 0xa2, 0x4}, {0x7, 0x3f, 0x6, 0x2}, {0x80, 0x4, 0x7, 0x3800}, {0x9, 0x0, 0x40, 0x7ff}, {0x2, 0x5a, 0x0, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000), 0x1000000000000128}, 0x0) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/61, 0x3d}, {&(0x7f0000001240)=""/168, 0xa8}, {&(0x7f0000001300)=""/58, 0x3a}], 0x5) [ 1157.270187][ T25] audit: type=1326 audit(4294967649.136:9579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13782 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000000c0)={0x3, 0x3, 0x4}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) [ 1157.374135][ T25] audit: type=1326 audit(4294967649.255:9580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13782 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000020000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1157.441289][ T25] audit: type=1326 audit(4294967649.325:9581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13806 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:09 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1157.541745][ T25] audit: type=1326 audit(4294967649.424:9582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13806 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) fcntl$dupfd(r2, 0x0, r5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000140)) r6 = socket$inet6(0x10, 0x2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) r11 = fcntl$dupfd(r9, 0x0, r10) fcntl$dupfd(r8, 0x0, r11) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200102, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f00000000c0)) 06:34:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:09 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1158.082482][ T25] audit: type=1326 audit(4294967649.960:9583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13847 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:12 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:12 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000b80), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x7c, r1, 0x401, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:tmpreaper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}]}, 0x7c}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x10, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20004040}, 0x20000014) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:34:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000004020000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x3}, {0x64, 0xb8}, {0x6, 0xff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000000)={r1, 0x0, 0x7fff}) 06:34:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1160.267642][ T25] audit: type=1326 audit(4294967652.133:9584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13853 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1160.312713][ T25] audit: type=1326 audit(4294967652.173:9585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13857 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000100000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000030000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1160.425153][ T25] audit: type=1326 audit(4294967652.282:9586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13857 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1161.104627][ T25] audit: type=1326 audit(4294967652.957:9587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13853 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:15 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:15 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:15 executing program 3: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 06:34:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000040000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x4840, 0x7, 0xb7, 0x20}, {0x2, 0x0, 0x9e, 0x3}, {0x0, 0x3, 0x3}, {0x3cea, 0x7, 0x2, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:15 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1c8, r0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x3ff}, {0x6, 0x16, 0x2}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1}, {0x6, 0x16, 0x8}, {0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x9}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x16, 0x7f}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x33}, {0x6, 0x16, 0x5646}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xad}, {0x6}, {0x5, 0x12, 0x1}}]}, 0x1c8}}, 0x80) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:15 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:15 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 06:34:15 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1163.399676][ T25] audit: type=1326 audit(4294967655.230:9588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13939 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:15 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1163.436401][ T25] audit: type=1326 audit(4294967655.269:9589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1164.199113][ T25] audit: type=1326 audit(4294967656.033:9590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13939 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1164.248009][ T25] audit: type=1326 audit(4294967656.083:9591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13953 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:18 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000050000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000100)=[{}, {0xc}, {0x6}]}) socket$inet6_udp(0xa, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3, 0xff}, {0x101}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:18 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0x20000000}) [ 1166.379629][ T25] audit: type=1326 audit(4294967658.187:9592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13988 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_io_uring_complete(0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1166.423570][ T25] audit: type=1326 audit(4294967658.236:9593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13989 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000040000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000040000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000040000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1167.219322][ T25] audit: type=1326 audit(4294967659.030:9594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13988 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1167.244372][ T25] audit: type=1326 audit(4294967659.050:9595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13989 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:21 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000060000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000b80), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x7c, r1, 0x401, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:tmpreaper_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}]}, 0x7c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macsec0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000041) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x1, 0x3, 0x3, 0x22e9}, {0x1, 0x68, 0x5, 0x7c}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r3, 0xff}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x800, 0x81, 0x6, 0x38f1}]}) 06:34:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:34:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1169.437209][ T25] audit: type=1326 audit(4294967661.234:9596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14049 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:21 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x4, 0x3f, 0x5, 0x9}]}) vmsplice(r0, &(0x7f0000000600)=[{&(0x7f0000000000)="fe3da1f8b48553937994bcf0781fe19f4c70b8e89d5345a99d6778a252cfd78e0c9b287a06ea134cd3f8df10136fd8c0acef8fa5", 0x34}, {&(0x7f00000000c0)="9e4cc4b9c629b0dd91593276366e85433046b58916182751fb04065db1e81c2637f4a7fa672a2e711ed532efa09ee562809e3c8b550f27b84bb6b3e401df51b36199ed49301e2bb92a2c66b334e76bee2e7f51d3ae5bb4871b6391d41fddf110d1a2d1654f18243dda696a1b49072bf444192adcf166a3b2101c9085619c8a6e38c65efdb57390fcce5fe63a035054d3766ce26ecc16551cdc51f72a358eef2b5367a29c106ff50793f752e68cbc953203aa2e1384add611950521619f0220ec3581230e9ff8438e0ff2ab10d7466c9b38c4b8952aa7f3ed", 0xd8}, {&(0x7f00000001c0)="7292a7ac1cc2190044b7bf0c6f6b551c7d4123f46abe29405df5feab41077d98eb2ea0876794de4465418eac83375de3f218ccea3cd711d89696a5e66c570f877ec339347846e6ca300685590c73ad452d24d19bae72dc97c1d79f6d9b0cebd13528bb98ec77a11751450dd382aafdd0f4f61b404c4384c842fa5343881d648039557c52b9f55e4f8e1befd8c1074a86fc7f00d6", 0x94}, {&(0x7f0000000280)="36e4272330924ca50d939f1560e0ede4648f4b6f07a09d52671c1b2d65c847d97fe83a6f69cc4ec9c9fecb00f5ecb3bb17070db6b4511536fe3ad0f7cd7aadaf9507c0a55b93f07ab88a3212f4b9b2c43e3da45203a0d053ace28b972e92e2c48f64e59f2aaf82114eac572b39097dbeb552c9322c9034674b3f927ebf2dbbd16cebd4c911fffe667b5cb3ed94f1135b87bed6caf06425515e682c36", 0x9c}, {&(0x7f0000000340)="8b6417ec187a42bb1a87f3ca52d5a0f848aed2ea17a81b6a94b08032488cc8f2dba3baa92567f858e3652dca7716454bda543913a776fca8a8144c3b13cee4bf70812865b5e5942f998d754658f3de99073e8f6caa30d4e250dab7a8dac08300abe865a64240d3c60da737e49b270ee59f969d0f56954f687f94ae328477e07e296fb99e7327", 0x86}, {&(0x7f0000000400)="3669fc6ce0c7623422b006662893f8b47dfee637ef246c058fc662c13dd0b5a70b1d18c1079f1c7f15e41fe4e335fc5b9501915e0638d3dca12fa3470414bc60d90e7f1506675841c145d7769cf80f684c", 0x51}, {&(0x7f0000000480)="ffb0765f2d82681e4f08e12c9181cd81a913955d6e7d5acad0a5f7514d0718481f989b416e0b6baddc866a46b2fe6a4d220fd5aa9a041030a68935662a5e3a36ed0e64b1ded97add0512c7fe074327df644fe1f21f5a7ab595d24d7561a751bfe2d56f8c374938bfe97d79419343ecc37a62c204d5c2b611381df1128ba5423094cbf0729ed434531687e46ace9ef0dd53076acadceeeb004eb4810b3bcc09804a9aea7d606e3c7cf2a23b39", 0xac}, {&(0x7f0000000540)="ca71ef82967bb4c672f6d25127452d843cb8234c2b761c034aef45f779eed37a39f1e582bc93aab53b82441a3ca48a1eefb2ff3b52633c08507730da0aef3516f13ff41c386ced9eabe8a166247df43be4de4d40d82afcb44142eac2d8671853f299b26c8d673a391d", 0x69}, {&(0x7f00000005c0)="e06761789bfc57c22a652f22b65dc01fafdb801a0d02d15cda7e135d6f4dacd917283d9699e004d3640e7fa33be0299b8313828a73406acd1a03a70ca66e3a", 0x3f}], 0x9, 0x2) r1 = dup2(r0, r0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000740)={0x2002}) [ 1169.487021][ T25] audit: type=1326 audit(4294967661.273:9597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14050 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffff6000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1169.565351][ T25] audit: type=1326 audit(4294967661.353:9598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14078 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffff6000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1170.271016][ T25] audit: type=1326 audit(4294967662.047:9599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14049 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1170.398916][ T25] audit: type=1326 audit(4294967662.176:9600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14078 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:24 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000fffffff6000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000004060000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64, 0x0, 0x0, 0x10000}, {0x6, 0x5d}]}) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7e6ff835fcbb4870f8aeca99d4557dc8885328ded17b09a94644076afd6343a3d28863ed2214aa0da3ccc2d9ea580edcfbbc43b5ac44bcb65fe7b2a7980760450724c211a2ba670a64bfb0a20a975cbc96", 0x51, 0x80}, {&(0x7f0000000240)="8c587e387582ecb6e2eb836a7c8eab3d4e823ae6a6a7a5d2833074fa8be447bbfab2cd50e82431966539977322852dfa8dc9118dfd5901849d78efced5612841f46b2c73726f8a84d336b89a52734aafe584d6aa5bbb160e7567dae284aac30c4ad6df0de505aa72164eb914b954588229ff4f3ec6c93941a25504dc1b22de242504ee209c0d06f47dfc202c8a59ab69e26b3dcfc23a7ebe867e1bf179ff52e6302db048a4d63fe09582940867907c46c2d5e56fed39d69ea71e43222e16f71f62129f497c0f0e438d35fb13b5a7549ebf11ce913c3caaf94e91b8116dcbbbf50399", 0xe2, 0xfc}, {&(0x7f0000000340)="9a2e677e0c304669e2da2153a3f9315b6fb8adb81007c4da91e9383f5285178bcb5edf6b2932ddf5db281a1b3fe01b4ea97cb3322a60339959ed4b92f7c1fe043b799a9ee1427f671c7e543f71debebff7a2060aec062acc664499d067391da8f47a85a7c7a77e1b927f683733d7ca9255e591de1c9f2eab8066f9f44d714c4a", 0x80, 0x4}, {&(0x7f00000003c0)="fbe4c9b3cb76eec2a2e1ff59fcc02f38eceef33bb79c63d11d7e15604cb5e11481edf20f78f4f1ccebd3d4c8d21fba8c5cb6f95ac56d5de63b140b3ea5155d5e8309b2f1f997", 0x46}, {&(0x7f0000000440)="2a8812d555e6a34ec39053d29bc97980f0f160f5802eb85ae7df6e27cbc4822af5f2eafb4f702bc74670571f68c5925904e85d14cb656a4249df3fa6a5907b797408de686c3359904bd9f5eca4dfb05c83aadc195759718b683057929574a52373933041387efba27e2c0230f8b61f7ff5034a8ca736e808d6ac6e43c0f1d8825189da86c862857802828079270207c5bb8f11c22922db3415de712f2177ca67341f26b790146c1e1a1f5a340fe490cf2d9ed91551270ccc787ee646d6d37209eb427297e409fa4a30af", 0xca, 0x9}, {&(0x7f0000000540)="8941c6e948f4c0551452a0f3e03ea240200e88f35c7c944b2ba9663d471e77b7a39037b87210683bd438c8c0becf4aefec3c6c680e5d640fe5694ee8aac98cf429d7519b1e1fe4f0199530eebda89da5f5df80918e35acd8e3ff9ab2256fec0d602fb9be89eee94ec58b4998671878893299a5b9a1a44ad7cc73480d350cc23c4aee4e55a60af8386a1c", 0x8a}, {&(0x7f0000000600)="4a26966668b4199d2c6a483cc943e38562c17d7428f5f010e5139dc47115828e9da9bd377823ce0f2d08722770e4b298f2bd60e9b5297133deef31d4ba18cc7f69a2ac61622db92c693c8e00e3f39a121401e0ab2fabfe356d04b1c216bb2f613733029cb9038e778222bf7172534b6baa8e1638486c28ef6e7dd8cb711a5ab556a70b83185cf972bd471a7888054abf3ca0075b94b0", 0x96, 0x9}], 0x200001, &(0x7f0000000780)={[{@gid={'gid', 0x3d, 0xee00}}, {@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x6b, 0x38, 0x37]}}, {@huge_never}, {@huge_always}], [{@smackfsdef={'smackfsdef', 0x3d, '&'}}, {@audit}, {@audit}]}) faccessat2(r2, &(0x7f0000000800)='./file0\x00', 0xc0, 0x300) fcntl$dupfd(r0, 0x0, r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000880)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000000)={r3, 0x3, 0xd6}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = dup3(r1, r2, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r5, 0xc0182101, &(0x7f0000000100)={r6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000840)={r6, 0xfffffffffffffffe, 0x4}) 06:34:24 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x88000) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) vmsplice(r2, &(0x7f0000000cc0)=[{&(0x7f0000000b00)="93c92e54c816286f3b9415aa729e029538e3ee854454b912624e8706e658603bd78cdb2dc6c6e1a8b1e530993ea605f453d2acc9dd72fe8b5db2a749aa441bf336439a795908c6724b734d452104bb4001aa15fcc2233caf93a26c550339fa24ccded93ed8603912937852e74de560dab4d60161fa4070dde1027a727247afbe2138fcc3542a0d1d3e26e26e65dd1f21ed3f7bd866895a3ee12cabf90d75a7e55be40fdc706e74f8fe344598cd92c3c29fa04bd8fb75744b6df99a3f7824bdd3573fe5b508938537498ff8916daef7c540d73d1cc91c7ee1090b745b88df6c9999e03ecb94de168dcc0d5fed99301845d93687110888a34d6d", 0xf9}, {&(0x7f0000000c00)="79ee10712f190d07582fed439bc811c3919a4c6af46ebc3f354d784ce5088ec3e5b7f73bf4dd3cd6dd9f3e5a28e39278ebb44bff3ee2aa86e7ef6be15305b90e56ccbf1eaaf526772dc9c4bc9ebf", 0x4e}, {&(0x7f0000000c80)="0dfdfc967e1fbf2fc325188e5d0f0b3a1ce9d74fac9c", 0x16}], 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001440)) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f00000000c0)={0x0, 0x2, @start={0x0, 0x1, "44e8a68c590ada4afa71a75268b6658d0ef653088628bc6898f9c8e99c18104d643d33f31d8a39399d897c0461a83a6dddfb8edbbdf0e916f7b6620671096f7f0c4153fcf83cce736300512156829829cf1f02d3dcbf1c536f70fdee1a398b92eaf6599053e0fdb79f58ec18159b9486da0073ca482a291bb33efa1e251c72fb98780e30fc7677584525652e7955af1997de32a766a38d6d00f5f0ae5b277af00bca79eff8cca8f6031a32c2f8cffac1bcb517cc2233b78f5acea04ae00d17e677c18e601b6b6558399ecf077bc14f6acf0e55ecff3a9a1d8afa0c147c6303652a0a3f28f6819541b3b400876f9b86d30696a6126881ca7331bd11b35877b702061f01e3f8a3c769daab89c78cd3877aec37b1d1006891159d41e3663384dfc5b076fcbf2ba82e58069c2cec60c82124c83c7c161c27bc9d282b66fe1311c8e9d51dec3ea6c52aa7705777a84e858ea77eaa208d21b88cf457ef6d4af6e0ca46f8c0f2c677a993adc1790e648a9eb5a8538c14a7ba240fd351dcef3bc9df2b171e84ac283d6d5c773fbdf3d6c2248e7aee3e8d92cfecce1991948a7cfeb96dfffd52ebd1411758dd379563400d9a3736f9f4aea07b4a935a76364569118d82d7c8ba65a77e768098f21c7374242b675e02410eddab4f8297852be54de79c471ee087e1d20cbe2eac32cb36846e6710e97405e457c6a720af0cb80ba6ca6a9130b9075e289924c2735ec4ea401b728a0bfd1fd038dcf1fcc5106ff715343941dd9b4af6c24a92af0489110c3857378bd5f0acb6524d847446fd357cf4925c69522e9f619c0882a7f989399e75cd132a4690bc1265a7c391b7e261c99997a69fd29024377a97fb038665fe42d6005c6ed93d4bc878ee33122ba68962ab7d9aeb1ae686803232f45eac5ccde150e3044c0813ac5f69182684532da1c364e031a39abc423a85cf9e5f311ae3b5e0ff97e23d1f0025c7905e6ac74e34847e79992c212d52840180790132b3634f5b05a6135dd83c84aed1a79233d7ed3a9890972700d711720b5323a8c8bdeb595fa397b6dffc132e4875992b2fa1227992ace9581bb3eef5dc246f9e23ca3f7a0475c52c4ee5d1d4815b51b31d42fe0eca4d325801cd8c7feca3414a3563e07772d784a410ebf036f6fde5b039fe9525889b5a9db6e030d5acd4e2c527fafdbceb8f19306fe9d5b2c91ed2f6d8b69bedf6ec85163066929f0a096f2c6b626b29566c1e208b0942f637e32911a0c84965755ae0211f4f390bf4211c8c18c7d376c3739ebeb457639d9d59ef9186d8c3ccf561aced2226ffeb062e43cef4aaa44a12ea6fd92244dccf5b3e5b92b721872dacc0cadedbfd12c69d70240b2b415c990e1c2f427fae42fa3f26904d530fa29e183a31be32e18464c21c2e1ed1f0cac4fdbd1e11153e64a442f8213c3a5c476758181196b431", "5fcd7762c50562872ce3205110628e7127b7c9145a0fa88b91f79df5094b7853f7dbe9a639b67333f6b5915b43dc692a3b26d9cf60492e5f0f1ea28598cdc342b52b92e205351a94f0ab4411bbc4879c54f591d1df06a387562149e97748fe4bede045559da1db08697691144f36ca7bfc05343ddb59815e8faefcbcd5000541ca922d9ab2d481bcace6b512cb068c58789563894e44c8091fddf1ed53b800a51f01e81abf76389a088cf37ede386492c9bffbb055743de1b98a4269467b56675641e1f8b6635d2e082fa31b26c68bb4d0824fb2b5a40816a9084929062f742d34843da921f0f3821c873ad1de40ee7de9a0814b72b42fa42f61b9cd5879ea73e05753561d122867effb4eb6b457af75ceca95c6974983dc2059054da495630fea28ea7c78a96aae32a55475318ef94afa890fc194744f04ca1db6686cb5e7bd4de3ee96bbb9a8d1f6c6fd9f98c61538dce05b33057ec7c67e49c7f7ffb0a1ab0bf2185c10590a184d836f2fba4cc95a9da1fe8854ac6b293bc1785ea1cf236ebc463a971d53cc58e234bfe7ac0cf602267acb2c30d85d1c17499c9643a0b3603b3ebc5e860b3057234f4ddbc206821e7815da9fb6ac6d241f1fbc5a107e436d02f62b5d1c7fcaaa00d9164cab3cb3399067e2a9421bd8b80e2a4ef35532baacd15d9b17862b677bb568bca08ca4cdce1cc50b156dede5542f09a960d0ca461cc1b7942cf0bdc61a140883fdaa27d428cf730f74de4bbee831cdd64cc87bf42099daf5d6223058a00c63d9b4909fd58a9f377cf91f17c2a5dff0d736f996501578195aff8b58720c23dc33f4cc11f7dfde8a1d4bdd2311c0e28d7a2f867d377506544320396806f4a99e9bd7598d22c863d407736bb9e59c10ea78787a339fc0368748383ec7df61dfcc1dbb3a0af95e9495169be04bb2dc7785b957b5704fac2eb95dd1614a6c4dc85b5b585bca3c0755cd0f9c642a9386786c39c523c05270ffbe6a784091b5d69bb0340c91dbfa3f73363306b79ddd5a59fc96eb4cb07d7dcbbe02947ec3d8859ec43d19fae18a334134e6ea5b4f348659a65510598c49ecd005e0ca8ba587eee122888898355c10dcbc68eaa02e9f7fa45672c978008f2b6ab06cc5d73c79c717d4e9fd12532fc5a3e98daa7a2a4601a9558ce0e304cc090fdce19dea1299de2d19c2b676e71439b6fa64cdb4bbfda16ddcaa8b6db685d73731e13a5d068a01bc31432f8636f2063f9b1ada6abc44274eafec3f6cbd9c0cf14e517f1cd6671841655fa907747d9a4a4548dcad8dcbaa7f95348a7022c74741832cd155881da9a27424511ecaa82b8c89ec62502911eb968f535a09fc7648f96e2920f66e43e00ae89cf411ec1aef11fd46be24acbbf098140fd5dbb44ab685adce515984f5bf8e18e443f843b3a4f897ea336ddbe0f0cf3b5a80baad42c671"}, [0x5, 0x4, 0x20, 0x4, 0x5, 0x99, 0x6, 0x100000001, 0xfffffffffffffbff, 0x4, 0x7, 0x7, 0xf3a3, 0x1, 0x1000, 0x1, 0x5, 0x2, 0x8001, 0x1, 0x7ff, 0x1fffe000000000, 0x1, 0xfffffffffffffe01, 0x1, 0x8, 0x8, 0x400, 0x1, 0x80, 0x4, 0x80, 0x7, 0x40000080000001, 0x10001, 0x0, 0x4, 0x5d, 0x8, 0x3, 0x52, 0x3, 0x80000000, 0x2, 0x52fd, 0x4, 0x2, 0x1, 0x7, 0x1000, 0x0, 0x9eb3, 0x4, 0x80, 0x8, 0x101, 0x3, 0x0, 0x7, 0x8001, 0x0, 0x7, 0x3, 0x2]}) r3 = socket$inet(0x10, 0x80003, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000100)={r5}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000014c0)={r5, 0x0, 0x7}) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) write$binfmt_aout(r3, &(0x7f0000000d00)=ANY=[@ANYBLOB="0801070606000000ed000000030000004b000000050000000000000000000000e3543df786d0cacf6774f67a8887a060d368dc939e5bf8a281437161b984c3a1232d41a90fa1cbdf221f8072d2fe320f89e0bf1387fb1549e15762789bb5458d57912b62158c74e251a1ca359e056652c04133558b5f5f49b9d07c3ecd9852600ca081151d357e4a46ddd7469b15756873a8ecb78633058426a2cbf8a303d97e407d69a0906e84ca5c537e58c4448976db4e5954eac1bc34647342049f0f5a135f91eace86ba22422f214a41e212e51d40c57c8fd41e05b5b0fb4f0ac0198403bfff14c8b177ce665f4b2c92db628517d3519cf517ee4e297ac60de81b0f9c0f35dc4456e5227514845ce7aca851031380b3afc225fc0f7ef46642496ba3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003372f700"/1801], 0x71e) 06:34:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000026000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000026000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1172.516468][ T25] audit: type=1326 audit(4294967664.280:9601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14113 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:24 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000026000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 1 (fault-call:1 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:24 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000070000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1172.648250][ T25] audit: type=1326 audit(4294967664.409:9602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14151 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1173.345644][ T25] audit: type=1326 audit(4294967665.104:9603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14112 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1173.370938][ T25] audit: type=1326 audit(4294967665.104:9604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14112 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x4665f9 code=0x7fc00000 [ 1173.395426][ T25] audit: type=1326 audit(4294967665.104:9605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14112 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 06:34:27 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000080000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0x23, &(0x7f0000000000), 0x20a154cc) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x64}, {0xff02, 0x0, 0x0, 0x80}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000000)={0x0, 0x7f}) 06:34:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 06:34:27 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) preadv(r0, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/112, 0x70}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/163, 0xa3}, {&(0x7f0000001200)=""/151, 0x97}, {&(0x7f00000012c0)=""/138, 0x8a}, {}], 0x6, 0x1, 0x1f) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x4, &(0x7f0000001400)=[{0x31f, 0x2, 0x1f, 0x1}, {0x1, 0x0, 0xff, 0x10000005}, {0xba1, 0x3, 0x6, 0x7f}, {0xfc00, 0x7, 0x4, 0x1}]}) [ 1175.571178][ T25] kauditd_printk_skb: 1774 callbacks suppressed [ 1175.571192][ T25] audit: type=1326 audit(4294967667.307:11380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14197 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:27 executing program 0 (fault-call:1 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) [ 1175.615509][ T25] audit: type=1326 audit(4294967667.347:11381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14199 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000800400000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1175.664899][ T25] audit: type=1326 audit(4294967667.406:11382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14222 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1175.690179][ T25] audit: type=1326 audit(4294967667.406:11383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14197 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 06:34:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000e0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 06:34:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1176.406823][ T25] audit: type=1326 audit(4294967668.141:11384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14197 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1176.456916][ T25] audit: type=1326 audit(4294967668.190:11385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14197 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 06:34:30 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000180000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:30 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502102, 0x0) 06:34:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 06:34:30 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6, 0x0, 0x0, 0x3c68}]}) [ 1178.614076][ T25] audit: type=1326 audit(4294967670.334:11386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14287 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:30 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x0, r0, 0x8e, 0x80000}) [ 1178.651080][ T25] audit: type=1326 audit(4294967670.364:11387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14290 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1178.675882][ T25] audit: type=1326 audit(4294967670.364:11388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14288 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000e0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1178.737610][ T25] audit: type=1326 audit(4294967670.463:11389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14312 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000001c0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000e0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000e0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:30 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1179.144177][T14374] FAULT_INJECTION: forcing a failure. [ 1179.144177][T14374] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.157011][T14374] CPU: 0 PID: 14374 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 1179.165677][T14374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.175724][T14374] Call Trace: [ 1179.178996][T14374] dump_stack+0x137/0x19d [ 1179.183333][T14374] should_fail+0x23c/0x250 [ 1179.187832][T14374] __should_failslab+0x81/0x90 [ 1179.192634][T14374] ? kobject_uevent_env+0x1a7/0xc40 [ 1179.197859][T14374] should_failslab+0x5/0x20 [ 1179.202406][T14374] kmem_cache_alloc_trace+0x49/0x310 [ 1179.207767][T14374] ? __kernfs_remove+0x678/0x6a0 [ 1179.212709][T14374] ? dev_uevent_filter+0x70/0x70 [ 1179.217650][T14374] kobject_uevent_env+0x1a7/0xc40 [ 1179.222666][T14374] ? kernfs_put+0x39/0x300 [ 1179.227210][T14374] ? __pm_runtime_disable+0x27f/0x2b0 [ 1179.232679][T14374] ? __cond_resched+0x11/0x40 [ 1179.237368][T14374] kobject_uevent+0x18/0x20 [ 1179.242005][T14374] device_del+0x85e/0x8f0 [ 1179.246351][T14374] ? mntput+0x45/0x70 [ 1179.250359][T14374] device_unregister+0x11/0x30 [ 1179.255174][T14374] bdi_unregister+0x1ea/0x260 [ 1179.259840][T14374] del_gendisk+0x3f9/0x5e0 [ 1179.264257][T14374] ? radix_tree_delete_item+0x197/0x250 [ 1179.269833][T14374] loop_control_ioctl+0x385/0x3d0 [ 1179.274887][T14374] ? xor_init+0x40/0x40 [ 1179.279043][T14374] __se_sys_ioctl+0xcb/0x140 [ 1179.283748][T14374] __x64_sys_ioctl+0x3f/0x50 [ 1179.288331][T14374] do_syscall_64+0x4a/0x90 [ 1179.293197][T14374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1179.299532][T14374] RIP: 0033:0x4665f9 [ 1179.303522][T14374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.323304][T14374] RSP: 002b:00007f4ae5098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1179.331998][T14374] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1179.339984][T14374] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1179.347955][T14374] RBP: 00007f4ae50981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1179.356221][T14374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1179.364217][T14374] R13: 00007ffe031ade8f R14: 00007f4ae5098300 R15: 0000000000022000 06:34:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000260000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:33 executing program 5 (fault-call:2 fault-nth:1): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) 06:34:33 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502103, 0x0) 06:34:33 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000100)={0x3, 0x9}) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r2, &(0x7f0000000000)=0x8, 0x4) [ 1181.671804][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1181.671816][ T25] audit: type=1326 audit(4294967673.371:11392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1181.715249][ T25] audit: type=1326 audit(4294967673.371:11393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14385 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1181.739508][ T25] audit: type=1326 audit(4294967673.410:11394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14383 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1181.773203][T14399] FAULT_INJECTION: forcing a failure. [ 1181.773203][T14399] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.786017][T14399] CPU: 0 PID: 14399 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 1181.794612][T14399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.804977][T14399] Call Trace: [ 1181.808246][T14399] dump_stack+0x137/0x19d [ 1181.812617][T14399] should_fail+0x23c/0x250 [ 1181.817063][T14399] __should_failslab+0x81/0x90 [ 1181.822006][T14399] ? kzalloc+0x1d/0x30 [ 1181.826097][T14399] should_failslab+0x5/0x20 [ 1181.830790][T14399] __kmalloc+0x66/0x350 [ 1181.834975][T14399] kzalloc+0x1d/0x30 [ 1181.838883][T14399] kobject_get_path+0x7c/0x110 [ 1181.843638][T14399] kobject_uevent_env+0x1be/0xc40 [ 1181.848654][T14399] ? kernfs_put+0x39/0x300 [ 1181.853074][T14399] ? __pm_runtime_disable+0x27f/0x2b0 [ 1181.858463][T14399] ? __cond_resched+0x11/0x40 [ 1181.863148][T14399] kobject_uevent+0x18/0x20 [ 1181.867891][T14399] device_del+0x85e/0x8f0 [ 1181.872215][T14399] ? mntput+0x45/0x70 [ 1181.876209][T14399] device_unregister+0x11/0x30 [ 1181.880985][T14399] bdi_unregister+0x1ea/0x260 [ 1181.885753][T14399] del_gendisk+0x3f9/0x5e0 [ 1181.890212][T14399] ? radix_tree_delete_item+0x197/0x250 [ 1181.895748][T14399] loop_control_ioctl+0x385/0x3d0 [ 1181.900837][T14399] ? xor_init+0x40/0x40 [ 1181.905005][T14399] __se_sys_ioctl+0xcb/0x140 [ 1181.909653][T14399] __x64_sys_ioctl+0x3f/0x50 [ 1181.914270][T14399] do_syscall_64+0x4a/0x90 [ 1181.918759][T14399] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1181.924712][T14399] RIP: 0033:0x4665f9 [ 1181.928618][T14399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1181.948344][T14399] RSP: 002b:00007f4ae5077188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1181.956781][T14399] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665f9 [ 1181.964912][T14399] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1181.972892][T14399] RBP: 00007f4ae50771d0 R08: 0000000000000000 R09: 0000000000000000 [ 1181.980864][T14399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1181.988852][T14399] R13: 00007ffe031ade8f R14: 00007f4ae5077300 R15: 0000000000022000 06:34:33 executing program 5 (fault-call:2 fault-nth:2): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1182.116246][T14414] FAULT_INJECTION: forcing a failure. [ 1182.116246][T14414] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.129580][T14414] CPU: 0 PID: 14414 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 1182.138051][T14414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.148863][T14414] Call Trace: [ 1182.152141][T14414] dump_stack+0x137/0x19d [ 1182.156475][T14414] should_fail+0x23c/0x250 [ 1182.160979][T14414] __should_failslab+0x81/0x90 [ 1182.165832][T14414] should_failslab+0x5/0x20 [ 1182.170380][T14414] kmem_cache_alloc_node+0x55/0x2c0 [ 1182.175559][T14414] ? __alloc_skb+0xed/0x420 [ 1182.180166][T14414] __alloc_skb+0xed/0x420 [ 1182.184490][T14414] alloc_uevent_skb+0x5b/0x120 [ 1182.189240][T14414] kobject_uevent_env+0x863/0xc40 [ 1182.194260][T14414] ? __pm_runtime_disable+0x27f/0x2b0 [ 1182.199623][T14414] ? __cond_resched+0x11/0x40 [ 1182.204365][T14414] kobject_uevent+0x18/0x20 [ 1182.209466][T14414] device_del+0x85e/0x8f0 [ 1182.213898][T14414] ? mntput+0x45/0x70 [ 1182.217861][T14414] device_unregister+0x11/0x30 [ 1182.222627][T14414] bdi_unregister+0x1ea/0x260 [ 1182.227405][T14414] del_gendisk+0x3f9/0x5e0 [ 1182.231815][T14414] ? radix_tree_delete_item+0x197/0x250 [ 1182.237366][T14414] loop_control_ioctl+0x385/0x3d0 [ 1182.242460][T14414] ? xor_init+0x40/0x40 [ 1182.246598][T14414] __se_sys_ioctl+0xcb/0x140 [ 1182.251317][T14414] __x64_sys_ioctl+0x3f/0x50 [ 1182.255895][T14414] do_syscall_64+0x4a/0x90 [ 1182.260341][T14414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1182.266230][T14414] RIP: 0033:0x4665f9 [ 1182.270109][T14414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.289708][T14414] RSP: 002b:00007f4ae5098188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1182.298119][T14414] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1182.306078][T14414] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 06:34:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000052b0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1182.314765][T14414] RBP: 00007f4ae50981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.322789][T14414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.331205][T14414] R13: 00007ffe031ade8f R14: 00007f4ae5098300 R15: 0000000000022000 06:34:34 executing program 5 (fault-call:2 fault-nth:3): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1182.478741][T14447] FAULT_INJECTION: forcing a failure. [ 1182.478741][T14447] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.491491][T14447] CPU: 0 PID: 14447 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 1182.500020][T14447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.510520][T14447] Call Trace: [ 1182.513804][T14447] dump_stack+0x137/0x19d [ 1182.518189][T14447] should_fail+0x23c/0x250 [ 1182.522646][T14447] __should_failslab+0x81/0x90 [ 1182.527428][T14447] should_failslab+0x5/0x20 [ 1182.531973][T14447] kmem_cache_alloc_node_trace+0x5b/0x2e0 [ 1182.537794][T14447] ? __kmalloc_node_track_caller+0x30/0x40 [ 1182.543623][T14447] __kmalloc_node_track_caller+0x30/0x40 [ 1182.549386][T14447] ? alloc_uevent_skb+0x5b/0x120 [ 1182.554475][T14447] __alloc_skb+0x187/0x420 [ 1182.558988][T14447] alloc_uevent_skb+0x5b/0x120 [ 1182.564059][T14447] kobject_uevent_env+0x863/0xc40 [ 1182.569194][T14447] ? __pm_runtime_disable+0x27f/0x2b0 [ 1182.574655][T14447] ? __cond_resched+0x11/0x40 [ 1182.579369][T14447] kobject_uevent+0x18/0x20 [ 1182.583893][T14447] device_del+0x85e/0x8f0 [ 1182.588272][T14447] ? mntput+0x45/0x70 [ 1182.592295][T14447] device_unregister+0x11/0x30 [ 1182.597076][T14447] bdi_unregister+0x1ea/0x260 [ 1182.601767][T14447] del_gendisk+0x3f9/0x5e0 [ 1182.606195][T14447] ? radix_tree_delete_item+0x197/0x250 [ 1182.611789][T14447] loop_control_ioctl+0x385/0x3d0 [ 1182.616828][T14447] ? xor_init+0x40/0x40 [ 1182.620992][T14447] __se_sys_ioctl+0xcb/0x140 [ 1182.625595][T14447] __x64_sys_ioctl+0x3f/0x50 [ 1182.630204][T14447] do_syscall_64+0x4a/0x90 [ 1182.634673][T14447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1182.640590][T14447] RIP: 0033:0x4665f9 [ 1182.644510][T14447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.664129][T14447] RSP: 002b:00007f4ae5077188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:34:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000000000000003f0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1182.672552][T14447] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665f9 [ 1182.680564][T14447] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 1182.688543][T14447] RBP: 00007f4ae50771d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.696533][T14447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.704519][T14447] R13: 00007ffe031ade8f R14: 00007f4ae5077300 R15: 0000000000022000 [ 1182.728807][ T25] audit: type=1326 audit(4294967674.413:11395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14385 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:34 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:34 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, 0x0) [ 1182.767468][ T25] audit: type=1326 audit(4294967674.423:11396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14383 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1182.814681][ T25] audit: type=1326 audit(4294967674.502:11397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14468 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1183.655771][ T25] audit: type=1326 audit(4294967675.345:11398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14468 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:36 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502104, 0x0) 06:34:36 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000800400000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6, 0x0, 0x0) [ 1184.723104][ T25] audit: type=1326 audit(4294967676.397:11399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14495 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1184.759630][ T25] audit: type=1326 audit(4294967676.417:11400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14496 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1184.784454][ T25] audit: type=1326 audit(4294967676.427:11401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14494 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:36 executing program 3: io_pgetevents(0x0, 0x3, 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x1f]}, 0x54}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6, 0x0, 0x9}]}) r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) io_destroy(0x0) pselect6(0x40, &(0x7f0000002600)={0x7, 0x7, 0x2, 0xdeb, 0x5, 0x1a, 0x6, 0x7}, &(0x7f0000002640)={0x8, 0xfff, 0xfffffffffffffff8, 0x101, 0x5, 0x2, 0xffff, 0x7}, &(0x7f0000002680)={0x100000000, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x40, 0x1, 0x400}, &(0x7f00000026c0)={0x0, 0x3938700}, &(0x7f0000002740)={&(0x7f0000002700)={[0x7ff]}, 0x8}) preadv(r0, &(0x7f0000002580)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/170, 0xaa}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/252, 0xfc}, {&(0x7f00000023c0)=""/89, 0x59}, {&(0x7f0000002440)=""/203, 0xcb}, {&(0x7f0000002540)=""/50, 0x32}], 0x7, 0x55, 0x9) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002780), 0x40000, 0x0) pwritev(r1, &(0x7f0000002b80)=[{&(0x7f00000027c0)="e64593bfe89b874b2c39982f292111d5475a11c25812dc682fe9e1ff5b3bedb7b1bd8babaeec849438f17a0fbd8b705c2750a8d4dd67055c276a871e59841d546d99c305043748db9b3708a0feee93fc1588d12a4a2bccb521ae442ee62b342e8eaf5a6eb00c435b4ae2201bd4061bd1f76d473ec80712e9d45e9b2e04354a1195c1f0a012343caf750d658e35574734495261a1e4d870e332ad0c5c69d06742f2cd94262c7e2514b2132b83ff473096789b944269aaff9b25fb", 0xba}, {&(0x7f0000002880)="2d8974b166424b7281a2c7dd2d21638676f71b4aa7bf783554ec994919047e68b53640e541596ab10eedb940d675ba974f027f0feb6a6a2f2839a4960850d3a05f091b04e6ae6a2f871af3b56c0ebcd8993870b48b877f17bcd1c9b76339c7fb2d3bc0755eb3d76101e655fdfaadc6710efdc5d7f18b20c0c6bb904a2adc1cecf737d9d787e5067128945053630a7b4417195e25aec99a3060412cecdce9b1866f6c10c8c9d196d202ccef3bee7591bc3260ae36372171d29b4aaa8d1340f0c8c5c1a5c90c2bbc85cfc0cb50255177c312b793252cf25b25bd5d7cc9b89562c17db08dd6", 0xe4}, {&(0x7f0000002980)="d39b04984997128233cebe94ff20e546535917cab1f9d886d4e544de340b9c1d9932c27a04658d09f10ade5804b64757595e908474073ce92d77521d165dbeb7a4b24e19f173ae003e150eeabe6c64cfa790a8a053d21854f098026b1d6fe03dd2441d2d51a0cfb3d9a94236bb4a301c741f260cff7e8917e1d38317b5fa54b8d95ca07164da55a5ba98a6b0fd55746616de5c74a940e89a3aa3df96916cace18f8d522b3060ba65", 0xa8}, {&(0x7f0000002a40)="02d7313c28c6f976a7b9d03c71ee7fd1ffa3b96eb136b7ac6d65850c13d39844b36bd98c2aa8", 0x26}, {&(0x7f0000002a80)="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", 0xfc}], 0x5, 0xfffffffa, 0x3) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) r3 = socket$inet6(0x10, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) r8 = fcntl$dupfd(r6, 0x0, r7) fcntl$dupfd(r5, 0x0, r8) io_submit(0x0, 0x2, &(0x7f0000002e80)=[&(0x7f0000002d00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000002c40)="320765f9673fc8e59988f8deced4631842be8baaee49d5ed8155a3f0d93acd111ae0a29da391c1e51d2e180ae6c077323e2b283173b3e9ac333cdd131452374e5aa938f533c48bac3b58e5b65d1bce327a7ab1467e8104025a7eb00d9dcb0c331acd8db542cd297d8bb951cc2dd79860b86fb16484885f32deb9a5e6ffbf8b01e8daea366808caf73884bf7e41525ac14cb40e23736b4a70e7b77789fb4c9aed0b25a004c3", 0xa5, 0x20, 0x0, 0x2}, &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x7, 0xff, r2, &(0x7f0000002d40)="89c558fc6f3dba3ec24e7771742680f264986f0a79439bf0d9d5c2007e8c9c4a5d89e91dc9e02bfc7f5e42330255fef682b36317f441b1b3c76df1de19a36a90fb7840a7ae15f176f4fe3281fda712e10c43c7a112d703033456a39fd1f4c302ce94b90f271b3593e93831007a5f236a4246d23533ae8c9101a7003cf6c0050521c11a98d086f0c0f643647c5071271ed00964c5aa88e51fa197738d256b31e54e877cb079f0a4b246782e7fad04a81f45e7f0b1d1699c5bdfe555cf3aa08695173f3b8bda37861ea98d876ec2578cae7d3d494a41f9661acc0a22b2bbc2415546fbba210a27e89cd82a", 0xea, 0x7f, 0x0, 0x2, r8}]) 06:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4b47, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4b49, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000004800000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f05", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c82, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000fffffff60000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x8, 0x0, 0x0) 06:34:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502105, 0x0) 06:34:39 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) [ 1187.773971][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1187.774065][ T25] audit: type=1326 audit(4294967679.424:11406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14588 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1187.809536][ T25] audit: type=1326 audit(4294967679.464:11407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1187.838967][ T25] audit: type=1326 audit(4294967679.484:11408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14589 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x5421, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x5450, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000fffffffe0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x5451, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x5452, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1188.613843][ T25] audit: type=1326 audit(4294967680.258:11409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14588 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1188.638332][ T25] audit: type=1326 audit(4294967680.278:11410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1188.662999][ T25] audit: type=1326 audit(4294967680.307:11411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14589 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:42 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f05", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x5460, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:42 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000fffffffffffffffe0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xa, 0x0, 0x0) 06:34:42 executing program 3: sendmsg$sock(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000000c0)=@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x28, 0x6, "de72147977db5f25e5af820e5dbe7a29088dd1b51795a8d31f40fb0a7fed7e238134700139a01484ebb5bc14bb8dd40ee7faf487a155cddf4a0cad80353a9b", 0x1b}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000140)="9bd17aab9df9bc7bbe6a105ad5161fdb7f3bcc8570539609a51167b5bfc685e08fe79f2a4fed4d491a3fc35ae9f4c2e7be6ca9edc01b485cfb7004fb9b162b7b34259597", 0x44}, {&(0x7f0000000000)="2558479bc12a5132f501fd01354eb3bf46006a48ad691bfab3b4d99221ae76b89b2b429d2a14a8bcff21f753f5096e6b89ecfef8d3e63d2ed267cc45df863f22", 0x40}, {&(0x7f00000001c0)="0f8ceb0b4489a4ca1a2aaa1f63a763b9ce333633c7c781d4a8c5b1e7ed055f6ce1e26b2367d48f4b643d8dadb1648afef3f3b04041ecff4f31acf7d37a5f2b3067500f7239f60f36ace79a8d9047c9eb0b17a5f280622384dd590ad6827be70b41b690cad6d07dad295867c153bcaf6197a56270c320fef57c7e4317c2aad5cb62c55eb7a4c0159848448b38d4cc3f972155f65bd682", 0x96}, {&(0x7f0000000280)="0ab4cae7c2eb639066fd5355362b426411f5b71db2903d7ffd2b40bf48e0ef9ac191facdb9b8462dec1b6f9e106bba3f29718fb206fd2c0dffb3ed58b5f6e71043ce8af27c161e09442667683850b17172d1ee67ae69fd1fb337d602339576c97d63ea46b0ef5ab602867348f84a9b8485ca7773211074d35ec8010dac66ab2026dcd72458ecad07ff57b75beffa63c5e2cda290d15ef8effa03f251a273f85e4fac48392c297d5931840cefbb78a6f4d75755daf6a57759b8ae14b57aafb0a8b2e1d3ef4c267c5f721315b742d8dae2d1d90e8eecdd5eeeee29d34876e0daf86729f64989b8ebc352f5c6abaadacca25af058913a8634f14875e1c5027f90c150d15ceeeb62e76b4195f265556f694e8b3f25cc2163ffe87c1bba6711c300504c0be93fbe075d1dca09d8c1f5827c72af31b71dadeb6bf74ec303b43ae2e566dc232d0a71700e86e216d2c8d8f0c26d81966593988e7ed3c80aac47f820efdbc05f1e3882ed2c5809a8fabec19f3f638998ab474121f3555118b1ee7c1edf3321be0b9ccc68ab35fdaffaf70fa967e16fda9c1e25c3345a701a516a0fc88d857458853dbb13fb2204a2c0f2729ac6ee68be17d2262b21503f6fb3df5788bd867b1679d2d48cb50444c3f39e5944cadb53d2457a5205f4b096a5dadc3816819f93b8c613ee59be405a1290a8d7c245188614db5bd388abdf749337b2aafa0c799a2e6ab7bc6bee8400baafd7d4392c775cde62a3b7d66dff1133165489da4dc35862c1a0b32ca4b57847f28be5beed58b80e5fa5ee209f037f3bcdf8c0ebfefab5c7f462f2794e31550568c4cad32a2af115f8fa490891637d3eec54b304fbcc214c7e277efc1ee4d01c60e2733a8500d1777cd1c8bf6d2a834a67429eb03a00f5836664ff884fe070c1b7c25a365d09a5b071119af976abe8eb08afedf6b9aaaff9cd193543cc7981d7838abbc139ff5663c034a7b933ae5adba5f387e86444515304c8c180e124d6b3b7ab29f20c4351f38a9be2485f13cc46d09f040565f1b82bf69d67ff0cf4074d01cad79cdb636d36489772e649b9444c63331ccf2095c4cf4e078450e1dd638083f22b50efe4d0ef08605d34c4a6331570298785e1de582fceaec93436e01226ea582d63bc1e9c67f0ae7e111a92df4c8f696cbfb75581af57e85ed9e4f2f846e677d38c8d59eb0e582fe9276a96a636cb6a435a947bfc4d04e35c3174d3f96fa442c41d52870b47189f8a7ee49b008b8472a6738ad10cbab73ad926dd38345c0b5dc51a22e932aca114506a7f9da47476f2a4409c3a2cd2bae281a88059c2bbb3e19fb0643b41158c65a7b31695832d1f7babaa9dfa5f759b4222d4123c5655996693c74cedddfc9a46eab5d5333c88a134c909252d015c8f56048e7e5dc3c73de0496ce6d4cb55491c619c5a7d0f59b8119264214fbcf37404ab6d094e5c043ed5cee2be8953dca17532a6a0214d165fda7ae9d76afa4ac1dced1338096a26b3ca6e526034b09daa20b4bee5cc86ed02236fae0350d6637bdf073d5275a46ff4672bb1d83d695d0a2a7109b9588530f99071e005278756c6149ad7ac6b51560e9fa370d1f15a5ff1bbbaca3085060fc42d1c11e0abe9cde8cccb2f345ce3f216693093cc42df6b60a55b782a5c730155cc48c415d8b1270f938d9e9cd5a30c3940c5cf6a8e4f24cd04eb130cfd97ae0f66e59b7c8587bf3c0b61c697e7b1e40f92b530ab6e71db4664028ffe9586be983817cdc8417143619ace399546f5f44bfc6b2712cade726e2a507b3a6748cb762bd7031696cd986e7e5f2d15db5592e373d2cc6478b27c271cbede1c642902f8c6be32270fdc58a462f513ca77d405c289cd872c285d85e5a4254c2705503bc6b8cfd343195fa73b1120c1b3ec1a87b7dabf4b1271871ffaedc651f797c208a310374c479d0cb8648e7a53e61cd9092324e160c4d51790b723485f7edf80c17f9525844e2a20280ebbf0f1ab42acf167f191d92f7d13da7b66dee6c213a8735c8229e8e84ef13654be7f3f6a23a35a782858d61d01e70956f8bbf835420b6e777c9b5a4b67db530829355fe6056d3bf0d384372288cda05ec78a466298723556b5064002b82829161f8bdfc833f1921c5d523ab7faee1258b1044ed73aba6be6ef3c07613f9d9955f0d2d0d4fc22fbac16db3b3e58ab5afe153276c29909740e8f1e6fc6c4ed4ebf49f0d01a73b9c3698b8e0b20040c779f8e17ca4707ff76398c92f3b52e85eddbea32a4aaeacc8e1b0f24b6a80f6ea8c39dae7b3ec245d3984a3fe19bce64fb24a65bcf9f539b00dd71f3f5d59a79ad2d96351b74343338e49d0eb8cbbe20d86da4378168e906348ceee786b9ffc8cb48c37ad5bd3130af15d69f952a06e08eb983a4315b67839dda8734012552abfb61c6c73898f0539cebea095efea557ad1ef0d067638799190d1aed6d4ba5c6cd0fc3f466e5ed1431690de564e30b56b56d2af6bea3458b899f8749d383e12489ce7298b53c3c34475e642168136821fea6e550a0237a46f3acabbfa795b1636b9d4003dfcd6bab326291b158c1c618e86660dcca5d747d1907c4bfcade389f34b2c1d9ef65a13251fb8058564c91486d116dc8ad103cfb4a72a4b4a5bd94a1f3182c656d0cf3b642b9f3123b4c76a8dc2723cac357935529476a17a3594e4a8b18e2847833c85693c79ca31b04b1f31d1023aaff924939f6c2b1253ae12943067c93f15e86b824cdec5cc22b9f18a604dc69842dc2d8b8e789d421b206b126da7c7fd49bc81d6f26ae11d37b9f320b0f8adc19ae5571fa76c1cc4bcd3315350fd1674f4f47e44918af339f3b986cced58900b49fa991df7c22fae614e1f6e5d11b4b10b9d14bb8e70bc96f3221751879474eb203d8df96ad70b63b3f69fa7278f761dd86e32fe8bd7047050a0e71056c95d39feae43ba79c06e7c9d3e18e6676aff0a63e62d0aad3cf0e04c1820761b6533da1a12257334eae4eba0f513ba4a01f15bc9fe7cba7e23aafac16e45b2df6e3ebfc396a2fef6259952e5093f8d1a6f25a9a8d5c600863b865dadd67479c09d408b29febec8cbf1e55a7c31f112892ac28eef10691c0728255a4db6966171ff0af379c48524640dc11126a3a0dc16aa18be4c3ef07ab5032c8b6bc806aad4a81d84f74ee631e4d97a107a91618e039a6bff78ee289aade14cf85168c54eea2b408e8b8384e18d50696b9583a6037179803d572d0d941f453c28f101bc2849f55c07c6c2054e9936e40ca9484cc717a3f0f864af42b7b8298791439e4c1a79168c7c9410d7c48f6d85db551b0d53f1430893a85d8f96c10a9eb4bacdf3743d3a1a6af4983ed59495b18e188a3a6903028ecf2ddde579e91b3d0b6ce78733a4b8670b6df1a2ebe538dfa5642c748c6cb36e7cacaa5156151f40aedef16abe03807ce24f701da790f27772fb816077b4ecbaef818401e3e873f77acf455687e390074d6ff2d02dc331737fa626f0a592f4c561d448ffe940033ee4c5fe0e2eae98e6b4e3b574430f2bb496c0f0acbf5c52c0550833d45f7e6ea3bbc0c5b0936f15c50bf89d71b7f6c903a096640d05a6b35a5666f715d1b0531c8c15871e16414801d30974b88c0cac9757495c2419c011f295b458a8f7b97a442bb6ac790dcfb5658bedbbbeea23c4fe346484f19d078f8b81711255795f72978994dbd7faac814e529e317b7768f0a90002da2c4095f1fb15f81953cd46512ca4b02fdbc1fd87edaefcbbc75040e48ee1020c8eaeb31ad63f69a0e02ec2f9b930565b4ccb45b9ed6d2af054cb26838bedecf7e7d229029ad0d86c8abae491d2c39b2bf78becf8c6c501b6f746cedd5fa86fd30fa089d4fbc14becad5e417e2c34ddebe9c013d1a489087737e61ee95613fe057b289dc4328f9ab9b5fa8e8589527d457a7d5cacedea53c70c904163c91ffdc1d849ce2194a42c51a988e02c2351573cc57f04a1b6d42afc1b89df7174433fc66324b059f64e0209ff6d9f3937f32f400708b1ed96e9e4aa9a8dc1339acebd182a7c982bb4de6a16466cdb60cd4fad29c3dbc8581e1704f5f3e2d9c8ee3d1d3adf49643cbea57f9bc58acca519aa11bef27645e1f9b1e7fd57fcf43a5dd5fcfce6e365ee70524e3f738f79c885d28f4e16f7b53f876a4041757f9c58d50e4b63af3e1e5e5d85caaa9715d5c54846abd06c251c336d8f7917421f50962feb4dd5950a8e6bc7f492e720e061fbd8cc8fe706a458e0e069c2eec892872113806142685683825e412369dd4d056f88351568b38ea90ab6820fa85156fcf60884e3ddcd3f6a078c6f6e65aae50448de88654449bbe9c56f04970c8f7cba539bc97857e26863ca138b1d1ad56b8d1e663a314de501bda71eda03864d0e9943cff8f3dc0f535b8232af1db8fa08fc64ef6b847dbb89825d37ad6bebde4d35df0163b3aa2f6a9f22be850e1ad7a435e65503c42b512081760fc82a2827d23753fc630635c8c2983887ae0a80f5016748561472660aa6a8db7a6e0e0d299754680cea6770eb2e8740c0f87c95bad4f223d269ea135e5bcf6ca0ebb73621f0168ec54b20d820f21707596598dcd498708d3ad01b299792827c0ac4a06a4771d4e0ecdac91e95b9bf2f204a1ab31d9b8c406169dbbe1dbe1060ff79417824f3d0814d652cfd4aec8133eb9efe8a6335e8dfc9a3a0eb59aa3820dc8e2665ac79b263f14e5b64e4d390d596aae1345ad0ead69869b56227f64a18431c0244f0f444e332643fbc6672d5f026a983c970db9412a63d4e6e495c00497c96661a493b7cb584dd2d5cb779ab26f1640f1564be69593068908919341c45f6d9712994b715ba2994da2740118a87c401c22995b70b6f471bb30d3e8aa02f126c58951ec6450207133cace292d26da9e4745479f4f811b7aa143b5ca376a567c5fe708884ade060efa4c96cb2888e1220878cb0ee952028d70a235e66d410c94162f0c9d8c2de5337dd021d0d8102ce58f413f9b13a5ac37c28e0165af94699709b9022a9e4515eaccd8afc2c0c6df6ba23d89dfab918d7f9459922572ffec354a630a9c3dc18cb077945e5e805f0156f7547560e659b30813562193dc4714f6999a9d6e201fe6709bc1db8ab8898697675df91f653dd1847ccf33b1f8d9c723651e5107dc19c978a0b0bada3639cb8dafc10ff5d744b3dfa217718914f1a2b98609e822f120522b8b072f18cfe2fc113e4568521c58be46ad2bf290db8a951c7881f282f0acb684af7b2609a0ce2de201542ae0b3b246d8b90e82674e00a1b15c042a1afd409757b5443a5ebc6252a75e0d614ce7af2f4250af5e9fe2888463c58bf5ef84291833f1cd2f5e69f6bced3c25802311128e2d5add7a8b5d8fb60dc662dbb5e2937453aed040ead9bba4f1616566524cdc6cb38c02bd6bb88bd59bde045c8a4898e6408c1668b395e79645c217ac92a4106e8d63100d8685410b4c5d9bcb92aff5275f99fcb1bc86cf4cb6a1ca7355322636842b7d9dbc91c7801aafeaad362879132454507dfcc53692b60b0c52b094d8b40486564a5d5d4302adf40988ab1c16599996f165ab976d5c50cccbb6f6d05ba7ed81ae8793b95314bc368e54ada04f7e0241749320efdef52e58108eabc31a108b6a9310e70d37989444a6e7e1ac0c0018ae84861d19be17e1a2b35011af9146216047d77c221cd0e9b9f758d3a78a487ce4c5b076475fc9a1855ee665a6799ad463c5b5da615a1c81778d12e4733284c2f82806a8b2382dfe530d022b36fe0e1596649b78", 0x1000}, {&(0x7f0000001280)="03d869edb03053eb66ff22cee6f39aaddd13aa1346dd4a2656e2c2fcd6f5a17cac75cfb538bf8a44eb5d84e1e596b2279b8d9d37df385b2c", 0x38}, {&(0x7f00000012c0)="626150ef66556fa3f4129b4810035dda3f5d837033225738ca58c8b6f8a87de776effcb16bdc1916a88f7221892b98e5b4cbbd5e9afa01696a6f04cf1e6cefb78442f2ab63f5eb693ad615b7cb43af5c383f1c3fea7c1a30aebaea72d4fbd175258cf9b6015a4daa186bc58d93b13c256e4720d8c54755549cbf2660eba230200d9a0ebc779dea8ad5423101bcd2288f5fa75e1f2e0e2f214974", 0x9a}], 0x6, &(0x7f0000001400)=[@mark={{0x14, 0x1, 0x24, 0xfff}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xc00}}], 0x48}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:34:42 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502106, 0x0) [ 1190.829724][ T25] audit: type=1326 audit(4294967682.461:11412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14687 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x40086602, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1190.871914][ T25] audit: type=1326 audit(4294967682.481:11413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14688 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1190.896424][ T25] audit: type=1326 audit(4294967682.481:11414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14689 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x80, 0x6, 0x9, 0x80}, {0x7, 0x3, 0x6, 0x5}]}) 06:34:42 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 06:34:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x40087602, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x401c5820, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1191.021877][ T25] audit: type=1326 audit(4294967682.650:11415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14739 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4020940d, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000ffffffff0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x14, 0x0, 0x0) 06:34:45 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502107, 0x0) 06:34:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x100, 0xd7, 0x40, 0x8672}, {0x40, 0x9, 0x3c, 0xfffc}, {0x2, 0x9, 0xe0, 0x7f}, {0x6, 0x0, 0x4, 0xee}, {0x3, 0x20, 0x1, 0x82}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x481c0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) fcntl$lock(r0, 0x24, &(0x7f0000000140)={0x2, 0x1, 0xfffffffffffffffd, 0x0, r1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0xaf6d, 0x0, 0x0, 0x7}, {0x5, 0x5, 0x2, 0x2}]}) 06:34:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f05", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:45 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f0000000780)=[{&(0x7f0000000180)="3c44fc284268f0b0317341c03ea66a0890be6d637ab1acfd6ea0dde5f730830df899d5df3b3d519fa9277dbc78d4a60aa9638b03da652cd981e8da995f19fd2a6494355ccdf92fbba5749bd60acc78b218ad69bff52ab167e9cd0f057fad59604b8281767a3d31c1fe8c9826e3d2e3d9977c74801d1e88324699c4084932282926baab33a97af1f94faea9c33f6a22357676515f70db44badb091f9073a2a43b3e7d44de0fd1365dbb1958b621dcf3d95c3e047529845328a89d592554302080a6b3600658215084f91ec2bf7e18eb756caa", 0xd2, 0x80000001}, {&(0x7f0000000280)="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", 0xfb, 0x2}, {&(0x7f0000000380)="6eb5798ed07177aaf1eee34e1a22828ecdbf422808cebcf4725c42adc2f825de1e966b3cf782ab2a6c39a6524f2ba10423ce1d9c9a563069d6b98a0ab5d161902389bf7d99a2c1808b51e07da6ef9a650ff0f5c550633761265ba60ab17f527fe1613e661122495ee20e6fb0cfe0a5cf0fe357ebd21575b8495720cfc8be5a6a177a4bdba9e5a015", 0x88, 0x71}, {&(0x7f0000000440)="52006185cace468a3b3a254748efd98d576f0abef041f4314ae25d651db3b250a8b795ecd623603e5f1d9710e18003494b4b6d60dd9cb44abb93ae11bb76568846c5cda48c976f59e98903c5b05d5185ef622bc51f2ee20c5ba3340af305a320bcfde7b3256be538bdcc58830ea8eb9628395cf352b0b349e3cffa8e7c2bb6aaa32bf0e030e153efaccaec6eaa96253308febf6ce6de8e2ad0185b05781901d2f8f2a9406dac307d94e143ab757fd225a374d0fca1ae51ba5ab3a8cd", 0xbc, 0x8001}, {&(0x7f0000000500)="15b00f7e684a792fada054d9236dabbd772eb4bcaec45fdf792709ab99ca511f2bc5d91b47ad2d13e33e2d", 0x2b, 0x1}, {&(0x7f0000000540)="c3bc5713d224634c867dadb4fa65f6f2cb73f8b5af9a2d50535daee6fcca58ab6b879681f8c131c9090f17fb73950e4dcc15051ba6d3aa1125eeb7272f5e34cb8d48c508e469682813e0f708cc0deaebe7abbaa10c9e0dc0c62c5e2c22396ad53cdd53ecfb6dbaa7c8f6d873317cffd81c4242036fe99da3b1521dd031ae37f281e7f313796e5bc9d26f52ba2bae6db1a28459b566188cbf62cadef99225d863f2256275ca12d6253ddc", 0xaa, 0x8000}, {&(0x7f0000000600)="e57dd6b5fc683d3798f7071d37b53d54e8a365e37ee5c7eb94d735fa98d1073f6c9518fdbe2ff627c6da7fd5069ff2cd826dfcbe7a5f96012b3c68b1e98bf66970", 0x41, 0x3}, {&(0x7f0000000680)="904dfd4997ff7f6e97d8cf18060d4b29df57b0a53e644ec60ce533b487d645fb4657bbe68243abf19fa549003d404823ff49332c7f06119248004b40122a4876291ebcf3f15b3cc6d5fb4ca3baf47cd98a3da4167e23ae178dc63ed47fa25fbba1ed6c23e7eb4b7ffa6fa7d1ca13c68ee3f6f080f51076039b34eb4647fe3700976372713023ffa0a721229ced4b68e809a6550f75529e7f04f5f972a5141edcb397c763b76c35326a71dc6f1406279883852a95314c7b28272527635b15a00712c7a1f3cdd4d5074cd9827ad6b86525ebbe63ec55f48196d7f74b5179a71f23dfe688e9447ca1", 0xe7, 0x6}], 0x140046, &(0x7f0000000840)={[{@map_off}], [{@measure}, {@seclabel}]}) r1 = syz_mount_image$nfs(&(0x7f0000000d80), &(0x7f0000000dc0)='./file0\x00', 0x3ff, 0x7, &(0x7f0000001000)=[{&(0x7f0000000e00)="f501acf66bcf52e9551663b6cfbdc062e03bb5d6f1277a724abdc312c7484981cd0da3e9f3e9df8bd147397d59c6a44fda3a7ac2e9b12a8b5afd5014b607e45fee5be4012f959df82527c2ac8aae4f9cec7ca7f8fb5d66b44f561632732c71c03d45291a467bcb33c1dc0390", 0x6c, 0x33f906f1}, {&(0x7f0000000e80)="2185850c26a9c081b34a6326d63f097f9d35406453bbbdf0ffd10fa0682495e0cf2b52ee13398fc67a101017d9763677252c29d6355699f5556e3de8950f46521523e8f9d94f8d53398bc8d55668e6758131724054792ccf1fc5ea15de", 0x5d, 0x9}, {&(0x7f0000000f00), 0x0, 0x101}, {&(0x7f0000001400)="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", 0x1000, 0x1}, {&(0x7f0000000f40)="7856a24a5112ac4abae21f16d102c0b24b039ce35d4f6e4f", 0x18, 0xfffffffffffffffd}, {&(0x7f0000000f80)="c5ab4b45f0d7f5af19523eb9289ff3b2d30eb3ba03fc75b2ee5594625a2c", 0x1e, 0xffffffffffffff0e}, {&(0x7f0000000fc0)="d438ba6d556f1bb4b9a22bf2856ee72bd62ca94fbbac7351ccc0967104e448cd24f3aa5cafd438ca21", 0x29, 0x8ab0}], 0x10001, &(0x7f00000010c0)={[{'measure'}, {'seclabel'}, {'.#&'}, {'iso9660\x00'}, {'seclabel'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_gt={'euid>', 0xee01}}, {@permit_directio}]}) getdents64(r1, &(0x7f0000001140)=""/255, 0xff) readv(r0, &(0x7f0000000d00)=[{&(0x7f0000000880)=""/134, 0x86}, {&(0x7f0000000940)=""/176, 0xb0}, {&(0x7f0000000a00)=""/253, 0xfd}, {&(0x7f0000000b00)=""/199, 0xc7}, {&(0x7f0000000c00)=""/195, 0xc3}], 0x5) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) syz_mount_image$ext4(&(0x7f0000000f00)='ext2\x00', &(0x7f0000001240)='./file0\x00', 0x7, 0x5, &(0x7f0000002780)=[{&(0x7f0000002400)="6eed13347d9398ce5e139ce9a0ea7c4b9a0e3f076e6e03da5996bd7feddbd96d54fa4977a8e33a670d0e10725ca90db42a4e5041ec752b25b88df05ad96685cb2230f0828edb0601e777308072a0977c630254d01d55cf05b24691f675040775619b1093cb9821be26e5e770ac96fedb5720c2e4518175d7effa3eee59c836bd10936cf646efb59dd33d885fa8db07e51cfdcbc9eb471153164255c6cab928c0c88960250b5e79c0fc2012982f4fbcd5b185e0f35c3fd3193bf5855e1a42140d1322444ef9ee7d98e69880065f50eb8401aa0eee67db7a8fda9950a9e46cfceff59fe43f14cf81c1bf0b58f7b585d1dc18a3", 0xf2, 0xfff}, {&(0x7f0000002500)="e4606f83dc8969a0d1c3dd206abc8735c3a6bfc204d6cc02e513c63bd6f6014364fd8fccff28be04438c7bf0cd7d4ada3d5abdf65f51a7a0478866644ca8db6864d4cb0ccac8d7f9d6675434e2162d4169b3b0bfb7457737ca8686feb18a107cc61ab4e1b643ed8444f4c55d9edd271512c8de05be81d782a8d7401785b37fe395491989178067fb3328e21fe3de6dbc280c0819d0c4e241def8f8dfc61c61604078c1535e87674fdd753501f3732d1457867d042b5cabe7af935b577f3584a3de824e156820f675b7e80b582557f51e2451cc1523c0ce2541c4acddd22d48f3ac3ceceeffecb55e848f91afb34a48eebfc499269e1ae825", 0xf8, 0x2}, {&(0x7f0000002600)="c7046a075191738aa89c3e2ba44a32", 0xf, 0x8}, {&(0x7f0000002640)="9b7e74f584110b1d1677d9d1dd0e6e70639d99d49203ef47cd124b8ba0a422769e21f89d36f7564d32cbce284f7893380fc56239b15a837d4b14688edb9f0a2559a7ae4b07386a0f0775774a148aa22da559abb55d1f555cc527fa1cb097ff7cc482f4f3b3f7a0b6349ba703eda24b5ab9cb4f2a8b12a72593c3f23f3f56ceb366d1a9e7a85407d870cfc7968f91d43c01b564cfbafffac73e4ce2d2e0103db760dc386c33453bb43a0423895c8ef366c76d3fb348b51a7e65", 0xb9, 0x8}, {&(0x7f0000002700)="88e3dac7395de3481f96e377ed888a26b72cc46c307a49b010b6a79b8843d20bfdb77e49cba0e4c5f69f0eb979ed5aef287a0d30b1a000a2ce7da8f75426dc0316537d04db1245e03fb7aa9c0e3238a4dce0cc6ee301aaf1b6967e3922c8936f1a718c00af0d93c9e01dbb30", 0x6c, 0x7fff}], 0x0, &(0x7f0000002800)={[{@dioread_nolock}, {@data_ordered}, {@nodiscard}, {@nolazytime}, {@user_xattr}]}) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x3) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}], 0x1) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000001280)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)) [ 1193.886674][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 1193.886686][ T25] audit: type=1326 audit(4294967685.488:11419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14758 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1193.935664][ T25] audit: type=1326 audit(4294967685.537:11420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14759 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x80086601, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1193.968651][ T25] audit: type=1326 audit(4294967685.567:11421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14773 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x80087601, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x801c581f, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000feffffffffffffff0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1b, 0x0, 0x0) 06:34:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502108, 0x0) 06:34:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0xc020660b, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1194.725838][ T25] audit: type=1326 audit(4294967686.321:11422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14758 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1194.750158][ T25] audit: type=1326 audit(4294967686.351:11423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14759 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1194.806166][ T25] audit: type=1326 audit(4294967686.401:11424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14855 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1194.833839][ T25] audit: type=1326 audit(4294967686.431:11425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14860 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1195.643341][ T25] audit: type=1326 audit(4294967687.234:11426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14855 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1195.673486][ T25] audit: type=1326 audit(4294967687.264:11427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14860 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:48 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce2", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000ffffffffffffffff0000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:48 executing program 5: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)={0x400, 0xfe01, 0x5, 0x90e}) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0x10, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = fcntl$dupfd(r5, 0x0, r6) fcntl$dupfd(r4, 0x0, r7) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syz_mount_image$iso9660(0x0, 0x0, 0x7, 0x0, 0x0, 0x20000, 0x0) 06:34:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0xfd}, {0xa4, 0x0, 0x0, 0x5}, {0x6}]}) 06:34:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x64, 0x0, 0x0) 06:34:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502109, 0x0) [ 1196.945213][ T25] audit: type=1326 audit(4294967688.534:11428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14872 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffffffd}, {0xa4}, {0x6}]}) 06:34:48 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000000)=0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) 06:34:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000020000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000030000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:48 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x6}, {0xa4, 0x1}, {0x6}]}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x36) ptrace$cont(0x9, r1, 0x5, 0x3) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(r1, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) process_vm_readv(r2, &(0x7f0000001480)=[{&(0x7f0000000200)=""/213, 0xd5}, {&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000380)=""/245, 0xf5}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x4, &(0x7f0000002680)=[{&(0x7f00000014c0)=""/75, 0x4b}, {&(0x7f0000001540)=""/63, 0x3f}, {&(0x7f0000001580)=""/180, 0xb4}, {&(0x7f0000001640)=""/63, 0x3f}, {&(0x7f0000001680)=""/4096, 0x1000}], 0x5, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f00000000c0)=""/30, 0x1e}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, 0x6, 0x11940) 06:34:51 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce2", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) 06:34:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210a, 0x0) 06:34:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2b9, 0x0, 0x0) 06:34:51 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x7, &(0x7f0000000100)=[{}, {0xa4}, {0x6, 0x0, 0x0, 0x80}, {0x3bda, 0x5, 0x5, 0x4}, {0x73f7, 0x6, 0x1f, 0x80000000}, {0x7ff, 0xf9, 0x3f, 0x6}, {0x2, 0x80, 0x80, 0xfffffc00}]}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x204000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) signalfd(r1, &(0x7f00000000c0)={[0xab3a]}, 0x8) [ 1200.008604][ T25] kauditd_printk_skb: 9 callbacks suppressed [ 1200.008642][ T25] audit: type=1326 audit(4294967691.571:11438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:51 executing program 3: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) fchdir(0xffffffffffffffff) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={r1, 0x2, 0x80}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) [ 1200.055266][ T25] audit: type=1326 audit(4294967691.611:11439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14997 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1200.090837][ T25] audit: type=1326 audit(4294967691.651:11440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15013 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000050000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12000, 0x84) ioctl$BTRFS_IOC_FS_INFO(r5, 0x8400941f, &(0x7f0000000140)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000060000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = fcntl$dupfd(r3, 0x0, r6) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e33, 0x7, @loopback, 0x7}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) r8 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) r9 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r9, 0x40b, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000018, 0x8010, r0, 0x922cc000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x2440, 0x0) 06:34:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000070000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1200.840841][ T25] audit: type=1326 audit(4294967692.395:11441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1200.922949][ T25] audit: type=1326 audit(4294967692.425:11442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14997 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1200.953642][ T25] audit: type=1326 audit(4294967692.504:11443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15013 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:54 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce2", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2ee, 0x0, 0x0) 06:34:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210b, 0x0) 06:34:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x24}], 0x1}, 0x0) stat(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, 0xee00, r3) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x41) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r6 = syz_open_dev$vcsa(&(0x7f0000000000), 0xffffffffffff259f, 0x161167858a40e0cf) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000080)='./file1\x00', 0x20000000) 06:34:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000080000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:54 executing program 3: sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x4000051}, 0x80) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000000)=0x221a) [ 1203.047770][ T25] audit: type=1326 audit(4294967694.578:11444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15163 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7fff}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x5f8c, 0xff, 0x5, 0x10000}]}) [ 1203.096422][ T25] audit: type=1326 audit(4294967694.628:11445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15162 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:54 executing program 3 (fault-call:8 fault-nth:0): clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 06:34:54 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 06:34:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000000e0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000100000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1203.894834][ T25] audit: type=1326 audit(4294967695.422:11446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15163 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1203.969741][ T25] audit: type=1326 audit(4294967695.451:11447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15162 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a744", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:34:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000180000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r1, &(0x7f0000001240)=0x1f, 0x581) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x152, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f00000000c0)={0x0, 0x200}) r4 = signalfd(r3, &(0x7f00000010c0)={[0x5]}, 0x8) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x1c, r5, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x90) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x30, r5, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xcaa}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x4000810) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r5, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="040027bd7000ffdbdf2501000000060028000200000008000b008000000008002b00850000000500300001000000"], 0x34}, 0x1, 0x0, 0x0, 0x40001}, 0x801) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x69c, 0x0, 0x0) 06:34:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210c, 0x0) [ 1206.102346][ T25] audit: type=1326 audit(4294967697.615:11448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1206.136860][ T25] audit: type=1326 audit(4294967697.645:11449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15286 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:34:57 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0xe, 0x0) 06:34:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) clone3(&(0x7f00000011c0)={0x20000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x30}, &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001140)=""/41, &(0x7f0000001180)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x3}, 0x58) fcntl$dupfd(r1, 0x406, r1) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000001c0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1206.463140][ T1027] ================================================================== [ 1206.471704][ T1027] BUG: KCSAN: data-race in ns_capable / task_dump_owner [ 1206.479786][ T1027] [ 1206.482097][ T1027] write to 0xffff888138edf02c of 4 bytes by task 15356 on cpu 1: [ 1206.489800][ T1027] ns_capable+0x86/0xb0 [ 1206.493964][ T1027] netlink_sendmsg+0x3ba/0x7c0 [ 1206.498731][ T1027] ____sys_sendmsg+0x360/0x4d0 [ 1206.504179][ T1027] __sys_sendmsg+0x1ed/0x270 [ 1206.508759][ T1027] __x64_sys_sendmsg+0x42/0x50 [ 1206.513528][ T1027] do_syscall_64+0x4a/0x90 [ 1206.517954][ T1027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1206.523945][ T1027] [ 1206.526253][ T1027] read to 0xffff888138edf02c of 4 bytes by task 1027 on cpu 0: [ 1206.533819][ T1027] task_dump_owner+0x2b/0x1d0 [ 1206.538490][ T1027] proc_pident_instantiate+0x138/0x190 [ 1206.543940][ T1027] proc_tgid_base_lookup+0x10c/0x180 [ 1206.549222][ T1027] path_openat+0xb5a/0x20b0 [ 1206.553738][ T1027] do_filp_open+0xd9/0x1f0 [ 1206.558154][ T1027] do_sys_openat2+0xa3/0x250 06:34:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0x10, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x25685f0e7c993588, 0x32) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) fcntl$dupfd(r6, 0x0, r9) fcntl$dupfd(r5, 0x0, r8) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r1) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1206.562759][ T1027] __x64_sys_open+0xe2/0x110 [ 1206.567337][ T1027] do_syscall_64+0x4a/0x90 [ 1206.571739][ T1027] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1206.577646][ T1027] [ 1206.579973][ T1027] Reported by Kernel Concurrency Sanitizer on: [ 1206.586101][ T1027] CPU: 0 PID: 1027 Comm: systemd-journal Not tainted 5.12.0-syzkaller #0 [ 1206.594628][ T1027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.604695][ T1027] ================================================================== 06:34:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000260000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:34:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:34:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1206.950437][ T25] audit: type=1326 audit(4294967698.449:11450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1207.013166][ T25] audit: type=1326 audit(4294967698.488:11451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15286 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210d, 0x0) 06:35:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000fe0000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6a0, 0x0, 0x0) 06:35:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) fcntl$dupfd(r1, 0x406, r0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:00 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a744", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1209.150896][ T25] audit: type=1326 audit(4294967700.642:11452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15440 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1209.181854][ T25] audit: type=1326 audit(4294967700.672:11453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15439 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:00 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x10, 0x0) 06:35:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040200000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000003600)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000010c0)={{}, r2, 0x4, @unused=[0x80000001, 0x8000, 0x8, 0x80000000], @subvolid=0x8}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)=r2) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000100)=r2) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002400)={{r1}, r2, 0x10, @unused=[0x8001, 0x5, 0x1, 0xffffffff00000001], @subvolid=0x3}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000640)={{}, r2, 0x10, @inherit={0x70, &(0x7f00000001c0)=ANY=[@ANYBLOB="0005000000000000000c000000230000080000000000000004005300000000000001000000000000000500000000000000000000000010f100070000010000000000000024000000000000004300000000000000a87979e6d5bd127075dc0dc043aa05afe31fa137634e20b83d3a4ba4addca5cc2ef00f8c8b6f6a7726b7fb08000000c1362d4da17df3f2dad9ab4db8c8b0cf4e7def754e9a4b35619f6504dc02c45123e97bc7d2a83bf44bbf07a600000000000033532c85477ac5cee4e85ea0a859b130b9e905e7f2e11d5ca77b57d94d3521a414337d19884bc228f80232ad959bfa4dd9dfd91845280400000060b0"]}, @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000021c0)={"e054efd1f0b8de003764f685c9e2ed18", r2, 0x0, {0x6, 0x4}, {0x1, 0x9}, 0x10001, [0x4, 0x2, 0x5, 0x6, 0x4, 0x8, 0x2, 0x401, 0xe8a, 0x2, 0x9, 0xef, 0x4b, 0x7, 0x137, 0x9]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000003c0)={{}, r2, 0x4, @unused=[0x4, 0x4, 0x2, 0x5], @subvolid=0x9}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000006c0)={{}, r2, 0x2c, @unused=[0x6, 0x1, 0x8, 0x3ff], @subvolid=0x7fff}) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f00000010c0)={{}, r2, 0x8, @inherit={0x60, &(0x7f0000000080)={0x1, 0x3, 0x2, 0x8, {0x8, 0xe2a3, 0x7, 0x1f, 0x3ff}, [0x7, 0x0, 0x28d]}}, @subvolid=0x7}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000140)={{}, r2, 0xc, @inherit={0x98, &(0x7f0000000040)={0x1, 0xa, 0xfffffffffffffff7, 0x47, {0x7, 0x3, 0x100000001, 0x0, 0x1}, [0x8000, 0x3, 0x100000000, 0x6, 0x20, 0x2, 0x3, 0x200, 0x5, 0x8]}}, @subvolid=0x4}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = signalfd4(r0, &(0x7f0000000000)={[0x4]}, 0x8, 0x800) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000300000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000020400000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1209.993836][ T25] audit: type=1326 audit(4294967701.475:11454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15440 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210e, 0x0) 06:35:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000060400000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1210.037277][ T25] audit: type=1326 audit(4294967701.505:11455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15439 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2500, 0x0, 0x0) [ 1210.073262][ T25] audit: type=1326 audit(4294967701.555:11456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) fcntl$dupfd(r3, 0x0, r6) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1210.122328][ T25] audit: type=1326 audit(4294967701.604:11457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15610 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a744", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:35:03 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0xe00, 0x0) 06:35:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0xa0901, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x811, 0x0) 06:35:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000800400000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc050210f, 0x0) 06:35:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2d800, 0x0, 0x0) [ 1212.305850][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 1212.305863][ T25] audit: type=1326 audit(4294967703.768:11460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15651 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1212.349756][ T25] audit: type=1326 audit(4294967703.798:11461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15650 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x4b01, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = fcntl$dupfd(r2, 0x0, r5) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0) 06:35:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000500000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r8 = fcntl$dupfd(r7, 0x406, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001d0000042abd7000fbdbdf251c000400feff4e240000000008001600010400"/52], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x41080) r9 = fcntl$dupfd(r3, 0x0, r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000000000002b0500000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r1) 06:35:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) syz_mount_image$iso9660(0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0) [ 1213.143738][ T25] audit: type=1326 audit(4294967704.601:11462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15651 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1213.168139][ T25] audit: type=1326 audit(4294967704.621:11463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15650 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde", 0x26}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:35:06 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x2000, 0x0) 06:35:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0x2) r4 = socket$inet6(0x10, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) r9 = fcntl$dupfd(r7, 0x0, r8) fcntl$dupfd(r6, 0x0, r9) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) 06:35:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0xa4}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1f0160, 0x0, 0x0) 06:35:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0xa4}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502110, 0x0) [ 1215.345942][ T25] audit: type=1326 audit(4294967706.795:11464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15779 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1215.378811][ T25] audit: type=1326 audit(4294967706.814:11465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 06:35:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(r3, 0x0, r4) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r5) r6 = socket$inet6(0x10, 0x6, 0xfff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) r10 = fcntl$dupfd(r9, 0x406, r1) fcntl$dupfd(r8, 0x406, r10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x113020, 0x0) 06:35:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000040600000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000003780)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "ca903402dac261"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000780)={0x41fb, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "b68c20807c8b3e"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000001780)={0x0, 0x0, "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", "d089a492ddff44f5222bb0730bcc5241d724c862a5b48a930c84a96032fb9f477181723ef9bb50b8ce93d9702155602ca7246670d75bb9dffe681cfc04c2412e38e881a6a8e499e6d3f82f952a7d9e3c15d656acfd17a99a68d3e8eb0c5b2f2a17e84b1d7be858bb76ee7001adc38c97876a47eedada5db85153f4b9ed98dad6c8a742b207f9a7968f11e0ca327ef75ffb43c6cb1bae5d022e509764d80fa2609f885b0d55568fd272ec54bfaedd0f2e1fd19cfd7390f94147caeff80629ef85d4e005f86cd7fabe8cf9a62f0b82414332d8535f700660c89d83b99526c55863e207cca376bc4f1691113128a8be80778a7bb4ef7a46207e8e746365005590fd8e1182da2c820a1b1f042a9ce4dc952bded4c93c3252393ab1a2e3981acdd36c5c944caeb36cd2b551c586dabe66d9f7458160236a146919bef317d78f8513819a4b368327647c3a5c8aa627d2b43dada9a4dd3d93e9355875a32d9f38231851ff199cca73d003d517686950ab841b1254730c9055bf72702e4ccd307759e1ada9d225779db03c52e0d3f3d8b9e62b17dd705bb6f228cbbf2387522f27569950723b7f9c9998ff19e848a5d5f76ef1970d3db4cf77c01869fb507e0daf625a523d381ff731366f07b66dc49fecfb9f438856bf79f3704abc4117be297c0d00a6d084bafbc889297f9648a89ba2e9085501625e3d4fa843a958c4a1aa52b352f88073abf08cff7d616dba89edbc95ce2a0d1224de92f5e08fd87e7ac8d40749ba98aad2ccc4c7ded2ec41d72869b102907a3494e76089b2659c1062965724314aad6721fa31931cea592fd73467a5995627ace5edd112e7b7f064e7b341d2d70d364d37bb3dd7de57832617386c8a65f075c87c427ffe641059c0c89b4c4bcb8d94c6b1054ca678400407bdef86d88688d20f43fdd256903bbafdcff89bfa1464ff5f16039a8c0e9eb8531c7dadc692ae26c9e77cb4433267ecd134b13127980880595b30b8cf7b8f586c512cd03cf9e1bc8527f9d28eeec15bab27b138c7d168ebcb08c6729b06dacd22e2f1a7746cfbea964fd5aa258b57cf2dac80ab4449a8dd5d70b393de7ab696ad83508862e171ca1d711e808540c52b5db29016ab1ba30a130a91b58db36d887ead854b164a7c92ec0a43d3248f7c56a6d6feedc215e49747d70aa3b0a04476ce380a55d79cbbc562579c405112aa5ebc95d78af7a22767a9871270db2d07bc1b01cc8fd6fdb6e2ff8a6a0e77128ffa67be31063ff6c284c2772fae51b3b6d5df9b87022542100ef4e91c1ab6bf36341cde4d749a5a20d308936a614f90ecc56024a2acd8a7bd09dd9caaecd0e58442e6f254a0c61792c8c3935a4db71849d05621e0354c3aec7b8ce9b0ef2a40a9dc259cc985b2e9a3b4e2fcc4aa0ee1cf944e83e09763deafd84682fbee3e5b2a6120520a4741c5df376933e96da93f73a07503a4ef9cdc56e5922ce773ac48750715ba33b2e2b41eaae914a355ef8df732f0fd9f8bb6efa4f9c98cfe010049f58547a82a934bbd1b014ce8d2ccfca326c5fe4178e7f6171647f58427b2e75af80818798bbda7d01c2f7052e49bbdb28065e8aa516d5822b03a8c881908506b058536e4d6d3d9909561b4cb4e31ec49ffd1d28f28e308d071f618a9d7b961b650c73776f2ab3370f07830ef1baf36a018660b5045f20df081ccb9f6657c48068151ac13657484e5dd0b4099d982cb2769ab591e5edf06b68d5b44061259b2c8720a99f26d2b01daceb22d923656686b45b1991423a20b3abbb2f8dfcf1b3a499bcc64461edbacc7de0eef491c87fddc147d7d9d00d0daf0eba81ee6e72c9f112c45d42734cc87a55caf40c2e4b7ef3ba0e258418b6facc371a3d1e3e73143b1e9a25aa135665d1eda6f0290ff9908db161867384f9fff47a8b2502192f857537354717eecbd309ef573b7a918052d9df0a58b6801ee9f199a39a08fd26adc83ddde1879c0fd88fb2dc3451d3ea7bcbef48433bc2fec1e5522826bf79e72c1699fa5a7d07ceaf8ed67b8ce234d8859a52c1fff42cbca47ee3553d0cc2f6cc2e1ffd5fbe3da3d9535582b54cc6640aa4fc29c5278a33c713ac8dd96aaa750945b22d0698b259ed5c83a50d274b5640d689d52a520f4936e12e9c39c49adec169ea0618fe788bdfc2c0ec44663401eac270efcf106f3f7836ad0bbab9a36ec6d811ffa6fd23ec6e86db9af3c79349f44e9e28366b55c81067421e999f1b20ff89918c67f22c63d584f7753a0968ef513134538263b3999450cf720f1fd7e3df5323c366a71809164df7e12e5398e3c38cbf3e858166d8999878387a09f1cc44ea3a50660bf1be3a3bdc3844e43e4c2f7d3b5cedbb70577ec2cf5f650431e3ff0b2433b2c5d4f7baa39566f6a3ec49b16e82e9ee620b773010f345d3df5d635e252ad45988b00739a631ea6a5b467ed1e4246e77f4d51335f4570e4b46ed5b7acafd4f881284b7ccc079b7ca8e4dc939a932cf460916f2d6e47be53f9aa2e161b5e2fd5c998cb27035f8b1ab2b7f9e38c2e05acb2d5d996ad7ef8c7baabdf89242d78bb10577a77dd61751054841c0214d62c7919ceb1457c76c8feb54fd2e667b6f47b75d4e05e5cd5274e7cd0471a7b3d4ab1daa2c4d278140270336fb1c83faedfa97e4516e560231be76a0e857b1a09b0bad46a425a8250889df8cc652e4e6411c80f8de2f52ef636c44a84560c00ef85fe47ec2ec8a71561956735752873e1760f70111e6296c69cf78650dd261a06caaa747bfd4fc352eba791fc361bee893da01cd3dde711f683eb0655fb03d3d3f839ad9a7aa08c359dbe36781e4470fc215f61404ad92f8c09b502f2159175a03307b5b0156ad2ef89077447579dfd3a38d4c4dd7c681bd5008c76473287bc487d2f189563131639b25be6e224bbc58b03008f8d136ecc06aa4d9421ec8ad8e6caca33b493ebb1a53e0cbbfcd5b05d36a796053e6c870db6c69b726bb3df4e0508999c69684f714699c49729bc5eb91b9fd9986360c1fe86d848d3738d5eef4eabd1b0723c9a4f31dfc681a1faf2fd3904208c13302ac73bffc5162c6caa1830e7787d6c0ee96a50e0d0b5fc944fa519b505200e2a87171f68012cf52a883bb9199c4aa9aa636f8de78ef4058ed259563d351cf40d612f4264d1e020396ee7e27195b78a5d766e957e238a231a49a778d959f9c97e1d5d50baeb021a3b161726cafc1766b7360625835af920310544b8dc5f65052cbfa3285ef34538e26d862cd81ff47b507d774f333d824d7c15da6a8d16bb1908fe7734e0580f4ecf42fe0c73834de1c172b43cea5ebb69d89839addf4bf37f305ff24d22e7f0978f7044892b0728746bdacecc0ac046a181ce3d7edad23267916baefc604c7c910d498dbfc852af72f90d3ff74e93f4b3fdb28b6809bc282ae91afbc542344b9da30fc92ab21dee3d58ada19039b514e912d3610cac5d4c5eca6bbf919e5ca0fd170f8defca90a7e5e0a29c1a8f9c71ddbe6a371b6397e2618f0b878a75519c7a80a8dc0a1012a05f4f8fb1b8df5d9e464e87d3f8ab812299808c6da559c8a8e12f1b382c76204527912632bfe521207843aff78e353a0e36c94dfda31c0aaad6474b0c0f6350db6255ef128fd0eff07c54d1f7c3cdf5f3d2636174fa3b39937d514fe8d2a33bb135b9943314f316d02e92403e1f6bd4c398bbf0ffbef1ec50d0fb4d396cb595fc08e9024f7c55972e48358dab7d5eefe4a5dd87b0ce59800779293e16bbadf367957ba7a56157472ea04cd2d590bf58dfc2e1c514ea44e2b4e03dd59956323c70bb169bc03ad1fd30214e014670c1b75b5bc46664672cac20c8c861d96aa648c7b5ad3cb1585636865d5bd12b2dc963f308a7de2974636210fe3baeb8e3ec130a1ffbde3c6651f6f2976c7ee2e02a9d25d18a16cab17df5890af167b8bb7028ed3183eadc4d760fc43c31d534ee31962e6fafa9459bc011174b017f68102b80e3b89a38dbe431110f38a9a1a24a448044e8c484317760b10f29eb3cb3695984805049d2f6f21ec65cadc6f8c7c22b9c042f5317e4edfff5300c44aa66081c823b7acec1158318ea0d82d53f0615cb1a9a28c88d2bad6f9bcf11b6bbba839d536b342254d6e30cdbce848e03a8a4d1690c6f93f2db85b96796fee24bde48130d39a1359602fe48ff4b8c79768278a225bca01b08e9e221c294c091938a7178e92cc73693326e27724da29706dfb33cd8af58215c3811a5d2c793a6e990f37f79d6ed16e7d5770857150db1c716c19f153df339f7a47e9b9c9496a636a895fd19da7e7e2ba7036791df9cde52736418bd87b89c437c7aa9170ddc4cbec4ff7ed97c0f124bc3d53731efd6b5399bcba80de272c421c35035cd8b90e185abb35ce5df9378763c10d4fef85eb1be345feb7b1e00dcb67750bac6a88cc9ff243de370c4965585d6ca0f1f6e74bb3b389c432ab904c7cb65328dc3c155cde24e6966a77def18da1cfc9d5f1724e2ad7f87799025ce96974f121d9f581fd377d54cdf829ec603c706cf9b8a95283e216b4a1dd6a5f4913554f3eb98cf46dab2e2380e9e2ea6a36a853e7a500ac94e3c10e9615d8e094ee6618bef2feb76e0aec18da7a36e2b00c6be9058d37314657b79504b5f3cb7b32ad11a59bc3753e24a1e49fe0fd0538ff931767ccbbde397eda76a4d58759fe4e292d4af8859a7fdb7bc19ace07235f54d9bd2b12f7469ad77eb8e6272e223ed3bc0263847302b856e1c87deb22cde51008814472865f80fc365d65082b669aa4228ba065e09e9c6697aa587d9aca2eab803ee5f7f02d961fded56d411e0743f9b2197db276b6ff4234b631d26e3533ca3af96449dfb6af6702c93e9aa8f417449517dadad8902609617d80cf9e16ea08d8a6dd8794d1f179b3901e9e4b2f1dde8b505c4cc96d9d3a52a87cd595174b6a7b86cdef91aa585e0c8ae52a8c7f633cf18f4d94961c08508c0ad3ccc92b15e24ca6e66bdb37a79885292f6b412011ddc4b78f8eed2566044c48d5d8500714db5281919a448b1c965c3c06fbbb0ec5c78dc5338108b4f76225e1f53791fab321750ba46fd2af1addd6bf8f25c3894922d5f41a479c21b523e6b6b073960f80ac3b2c87e4d54e2f39c2fbc9c1ca666d5f67f23b1dbbf0b2eb85962f02b01349552468f4be5fae73b39cd93630f9249e56633ac056d5c4e9726fc6c305020f3c0027058c9cbfe21a88feff371ff99a77400f3e564cf2dddefa2248978c93e08b7b15a267ba50c3ac195f502532bfabd2518dd45348006161e3cd91c72ae7a0777b3b2c525334151150c416db1865d19401bda462f9f4ee887d4492f55d098dfd14fcbb654f16e446e0490393e619a2849ad36e70dbedc87f14fd43115957a16c923abe703"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000002780)={r5, r6, "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", "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"}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r9 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0xc020f509, &(0x7f0000000080)={r8, 0x7ff, 0x9d02, 0x200}) recvmsg(r10, &(0x7f0000000740)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000000240)=""/222, 0xde}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/207, 0xcf}, {&(0x7f0000000540)=""/19, 0x13}, {&(0x7f0000000580)=""/72, 0x48}], 0x6, &(0x7f0000000680)=""/165, 0xa5}, 0x10040) fcntl$dupfd(0xffffffffffffffff, 0x406, r11) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0xee00) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:35:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) set_mempolicy(0x2, &(0x7f0000000200)=0x6217, 0x4) set_mempolicy(0x4000, &(0x7f0000000040)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000140)=0x1, 0x48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_io_uring_complete(0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000000)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\xee\x89dD7\xb1\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00p\x16\xc4\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/77) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf3a, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000700000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000080)="0243443030310100004c0049004e00550058002000200020002000200046eb062000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5d, 0x8800}, {&(0x7f0000000400)="88001c0000000000001c00080800000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[]) 06:35:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0x10, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) r8 = fcntl$dupfd(r6, 0x0, r7) fcntl$dupfd(r5, 0x0, r8) mq_timedreceive(r8, &(0x7f0000000000)=""/121, 0x79, 0x7fffffff, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = socket$inet(0x10, 0x6, 0xbffffffd) sendmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004000000", 0x33fe0}], 0x1}, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x8}) [ 1216.185890][ T25] audit: type=1326 audit(4294967707.618:11466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15779 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 1216.210065][ T25] audit: type=1326 audit(4294967707.638:11467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15780 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0