[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 123.675869][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 123.675917][ T32] audit: type=1800 audit(1583804014.727:39): pid=11409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 123.719592][ T32] audit: type=1800 audit(1583804014.757:40): pid=11409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 124.932841][ T32] audit: type=1400 audit(1583804015.987:41): avc: denied { map } for pid=11584 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. 2020/03/10 01:33:48 fuzzer started syzkaller login: [ 137.560726][ T32] audit: type=1400 audit(1583804028.607:42): avc: denied { map } for pid=11593 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16480 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/10 01:33:53 dialing manager at 10.128.0.26:40205 2020/03/10 01:33:53 syscalls: 2967 2020/03/10 01:33:53 code coverage: enabled 2020/03/10 01:33:53 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/10 01:33:53 extra coverage: enabled 2020/03/10 01:33:53 setuid sandbox: enabled 2020/03/10 01:33:53 namespace sandbox: enabled 2020/03/10 01:33:53 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/10 01:33:53 fault injection: enabled 2020/03/10 01:33:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/10 01:33:53 net packet injection: enabled 2020/03/10 01:33:53 net device setup: enabled 2020/03/10 01:33:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/10 01:33:53 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 142.875708][ T32] audit: type=1400 audit(1583804033.927:43): avc: denied { integrity } for pid=11608 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 01:36:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x2, 0x0, 0x0}) [ 309.592422][ T32] audit: type=1400 audit(1583804200.637:44): avc: denied { map } for pid=11611 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17493 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 310.212577][T11612] IPVS: ftp: loaded support on port[0] = 21 [ 310.430701][T11612] chnl_net:caif_netlink_parms(): no params data found [ 310.590874][T11612] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.598283][T11612] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.607832][T11612] device bridge_slave_0 entered promiscuous mode [ 310.624643][T11612] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.632254][T11612] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.642151][T11612] device bridge_slave_1 entered promiscuous mode [ 310.694099][T11612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.715042][T11612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.765008][T11612] team0: Port device team_slave_0 added [ 310.780607][T11612] team0: Port device team_slave_1 added [ 310.827064][T11612] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.834292][T11612] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.861755][T11612] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.881402][T11612] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.889384][T11612] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 310.916821][T11612] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.129205][T11612] device hsr_slave_0 entered promiscuous mode [ 311.372977][T11612] device hsr_slave_1 entered promiscuous mode [ 311.872281][ T32] audit: type=1400 audit(1583804202.917:45): avc: denied { create } for pid=11612 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 311.880335][T11612] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 311.897370][ T32] audit: type=1400 audit(1583804202.927:46): avc: denied { write } for pid=11612 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 311.929100][ T32] audit: type=1400 audit(1583804202.927:47): avc: denied { read } for pid=11612 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 311.985453][T11612] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 312.173015][T11612] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 312.426556][T11612] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 312.963668][T11612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.000783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.010420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.034666][T11612] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.060421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.070561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.081230][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.088541][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.100765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.124197][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.133760][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.143625][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.150869][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.159576][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.215534][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.225602][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.235441][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.246216][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.256487][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.306633][T11612] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 313.317539][T11612] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.331753][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.340929][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.350557][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.360182][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.369607][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.435104][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.443663][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 313.451389][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 313.482011][T11612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 313.553051][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 313.563193][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.629892][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 313.640443][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.667229][T11612] device veth0_vlan entered promiscuous mode [ 313.676221][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.685409][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.725909][T11612] device veth1_vlan entered promiscuous mode [ 313.820569][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 313.830973][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 313.855834][T11612] device veth0_macvtap entered promiscuous mode [ 313.881374][T11612] device veth1_macvtap entered promiscuous mode [ 313.948921][T11612] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.957515][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 313.967513][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 313.976902][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 313.987037][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.009521][T11612] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 314.019040][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.029040][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.473849][ T32] audit: type=1400 audit(1583804205.527:48): avc: denied { associate } for pid=11612 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 01:36:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x2, 0x0, 0x0}) [ 314.757867][T11638] md: could not open unknown-block(2,0). [ 314.763890][T11638] md: md_import_device returned -6 01:36:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x2, 0x0, 0x0}) 01:36:46 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000001e40)=[{&(0x7f0000002000)="ef84", 0x2}], 0x1, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='\x02\trust\xe3cusgrVex:De', 0x0) 01:36:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x2, 0x0, 0x0}) 01:36:46 executing program 0: r0 = socket(0x10, 0x802, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x8, 0x0}) 01:36:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x1000, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 315.638743][ T32] audit: type=1400 audit(1583804206.687:49): avc: denied { open } for pid=11660 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 315.662631][ T32] audit: type=1400 audit(1583804206.687:50): avc: denied { kernel } for pid=11660 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 315.687283][ T32] audit: type=1400 audit(1583804206.687:51): avc: denied { confidentiality } for pid=11660 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 315.752897][ C0] hrtimer: interrupt took 61790 ns [ 316.020219][T11663] IPVS: ftp: loaded support on port[0] = 21 [ 316.480287][T11663] chnl_net:caif_netlink_parms(): no params data found [ 316.990081][T11663] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.998014][T11663] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.007747][T11663] device bridge_slave_0 entered promiscuous mode [ 317.060168][T11663] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.067636][T11663] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.077171][T11663] device bridge_slave_1 entered promiscuous mode 01:36:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5b070700000000000000000000000000000000000000006d1000000496"], 0x1e) [ 317.201433][T11663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.241363][T11663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.320187][T11663] team0: Port device team_slave_0 added [ 317.350253][T11663] team0: Port device team_slave_1 added [ 317.424630][T11663] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.431804][T11663] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.458706][T11663] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 01:36:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 317.507127][T11663] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.514328][T11663] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.540533][T11663] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 01:36:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 317.799673][T11663] device hsr_slave_0 entered promiscuous mode [ 317.833128][T11663] device hsr_slave_1 entered promiscuous mode [ 317.862372][T11663] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 317.870109][T11663] Cannot create hsr debugfs directory 01:36:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 318.398280][T11663] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 318.484004][T11663] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.533061][T11663] netdevsim netdevsim1 netdevsim2: renamed from eth2 01:36:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 318.581808][T11663] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 319.042054][T11663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.079149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.088809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.113348][T11663] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.142083][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.153587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.163048][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.170269][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.186372][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.208034][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.218165][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.228189][ T2701] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.235395][ T2701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.284607][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.295095][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 319.323937][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 319.334106][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.344363][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.354889][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.405419][T11663] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 319.416105][T11663] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 319.434957][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.444051][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.454261][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.465552][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.476136][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.533625][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.553238][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.563388][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.607140][T11663] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.677918][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.689251][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.755211][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.765123][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.786094][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 319.797492][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 319.811384][T11663] device veth0_vlan entered promiscuous mode [ 319.861322][T11663] device veth1_vlan entered promiscuous mode [ 319.943007][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 319.954147][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 319.963667][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 319.973438][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.000401][T11663] device veth0_macvtap entered promiscuous mode [ 320.024121][T11663] device veth1_macvtap entered promiscuous mode [ 320.085869][T11663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.097218][T11663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.111036][T11663] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.119154][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.128976][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.138631][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.148688][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.174585][T11663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 320.185855][T11663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.199407][T11663] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 320.211588][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.222063][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:52 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001200)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x78}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffc48) 01:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:52 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001200)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x78}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffc48) 01:36:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:52 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000200)="96dc17cfc26e2e9b3a17ce5d38726e8e1465c0f520bece7d5fcbbdc81b0e0715931eee356eded2508728b33801d325d51752c0a1cb2a1ce7362482779db19fd383accd4b4dfc3329d77ad643899cc504f40aec40418286eeffb4a2cd98894aef8b9f5d1a0e1ff13ab5689a1ad5eaabed40a8b6390144db", 0x77) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000100)={0xd6, ""/214}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32]) 01:36:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 322.013886][T11744] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿ" or missing value 01:36:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:53 executing program 1: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x24, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='veth0_to_bridge\x00', 0x9, 0x8, 0x101}) write(r0, &(0x7f0000000100)="fc0000004a000700ab092500090007000aab80ff000000000000369321000100fc0000000000000000ff000000000000008656aaa79bb94b46fe00000007ec020800008c0100036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c8334b3863032000048b6e4170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43d3f000000000000003b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b00417cc821d9565187dc48deac270e33429fd3000175e63fb8d38a873cf10000000000f7", 0x183) 01:36:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 322.317454][T11755] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. [ 322.340325][T11757] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.1'. 01:36:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'syzkaller1\x00', 0x800}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r3, 0x560f, &(0x7f0000000000)) write$tun(r0, &(0x7f00000000c0)={@void, @void, @eth={@random="9f84bb57964b", @local, @val, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0xfffffffffffffd52, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, @address_reply}}}}}, 0x2e) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20e80, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r8, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r8, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r8, 0x0) getsockopt$inet_buf(r8, 0x0, 0x11, &(0x7f0000000180)=""/134, &(0x7f0000000240)=0x86) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000040)={r7}, 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000140)={r7, 0x1, 0x80000001, 0x3}, 0x10) 01:36:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0xa, 0x0, 0xff00}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000100)={0x9c0000, 0x8, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980909, 0x20, [], @string=&(0x7f0000000040)=0x4}}) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000200)) 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 322.998656][ T32] audit: type=1400 audit(1583804214.047:52): avc: denied { prog_load } for pid=11777 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) readahead(r0, 0x3, 0x1ff) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, 0x140f, 0x405, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX, @RDMA_NLDEV_ATTR_PORT_INDEX={0xfffffffffffffe12}]}, 0x20}}, 0x0) 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 323.375887][ T32] audit: type=1400 audit(1583804214.427:53): avc: denied { create } for pid=11787 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 323.393055][T11788] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 323.400742][ T32] audit: type=1400 audit(1583804214.427:54): avc: denied { write } for pid=11787 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 01:36:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="540000000206050400f00000000000000000000005000400000000000900020073797a31000000000500010006e5e20005000500000000000c00078008001740000000000d0003006c6973743a73657400000000"], 0x54}}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r3, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r3, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_selinux(r2, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='/usr/sbin/cups-browsed\x00', 0x17, 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r4, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400000, 0x0) mmap$perf(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x810, r6, 0x20000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x2, r4}) 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, 0x0) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 323.690977][ T32] audit: type=1400 audit(1583804214.737:55): avc: denied { create } for pid=11794 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 323.782997][ T32] audit: type=1400 audit(1583804214.767:56): avc: denied { write } for pid=11794 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 323.811449][T11795] SELinux: Context /usr/sbin/cups-browsed is not valid (left unmapped). 01:36:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, 0x0) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 323.863511][ T32] audit: type=1400 audit(1583804214.857:57): avc: denied { mac_admin } for pid=11794 comm="syz-executor.1" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 323.889577][ T32] audit: type=1400 audit(1583804214.867:58): avc: denied { associate } for pid=11794 comm="syz-executor.1" name="kvm" dev="devtmpfs" ino=35 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 srawcon="/usr/sbin/cups-browsed" 01:36:55 executing program 1: syz_read_part_table(0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000100)="020143a5ffffffffffffa5000800000000000000004000ffffffa9000000e100000088770072003a0700bfffffff000000000080", 0x34, 0x1c0}]) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x3, 0x44, 0x2, 0x0, 0x9, "0887bd9704853ac6"}) 01:36:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, 0x0) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 324.304515][T11808] Dev loop1: unable to read RDB block 1 [ 324.310427][T11808] loop1: unable to read partition table [ 324.316447][T11808] loop1: partition table beyond EOD, truncated [ 324.323139][T11808] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 324.485738][T11808] Dev loop1: unable to read RDB block 1 [ 324.491704][T11808] loop1: unable to read partition table [ 324.498559][T11808] loop1: partition table beyond EOD, truncated [ 324.505024][T11808] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 01:36:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:55 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETA(r12, 0x5406, &(0x7f0000001400)={0x4, 0xfc00, 0x400, 0x7, 0x19, "5974ad1af6bd3367"}) 01:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:56 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x400c744d) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000000)=""/107) write$binfmt_aout(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x3fb) syz_mount_image$ext4(&(0x7f0000000480)='ext3\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x808000, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/107) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000000)=""/107) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r5 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r5, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000680)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r7, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r7, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000800)=0xe4) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r12, 0x202002) keyctl$chown(0x4, r12, r10, r11) r13 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000840)='/dev/udmabuf\x00', 0x2) r14 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r14, 0xc008ae05, &(0x7f0000000000)=""/107) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup/syz0\x00', 0x200002, 0x0) r16 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r16, 0x0, 0xffffffffffffffff, 0x0) r17 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, r18, 0x0) r19 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r19, 0xc008ae05, &(0x7f0000000000)=""/107) r20 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r20, 0xc008ae05, &(0x7f0000000000)=""/107) r21 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r21, 0xc008ae05, &(0x7f0000000000)=""/107) r22 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r22, 0xc008ae05, &(0x7f0000000000)=""/107) r23 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r23, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r23, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r23, 0x0) ioctl$sock_SIOCGPGRP(r23, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./bus\x00', &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r26 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r26, 0xc008ae05, &(0x7f0000000000)=""/107) r27 = eventfd2(0x0, 0x80000) sendmsg$netlink(r0, &(0x7f0000000940)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)=[{&(0x7f0000000100)={0x1f8, 0x12, 0xa30, 0x70bd27, 0x25dfdbff, "", [@nested={0xf9, 0x55, 0x0, 0x1, [@generic="642ccfa0f1a02c3dcf8e72c0165bc0f2ff9428a2185115e896b6cd2d5d689848bc37d72cb79e55c03e7a3d86a7f587b9f49627339c0ad2adc61045f93a6942bc3c2fdb37d9e10adb90d09dd0ad00a4e66179c0d27061148fdeab36eb22db4431468dd8c269620c4bb52d5bbbe98adf32ad436c29280c1c7584106d482cf7d21e89dabe0e594904d48712f7e1b732b4193b57d574077ed5351ae4d46c329603b2b0be19b54a3b9866daa90adfc970831c7193c6d163a4c73f2e55a697eba7e3339503f9ee0a210a54204ba14163881d92e682d80e33fe4c93063b7f295f3b99cf1a07ad92ff85b523b50bd78971", @typed={0x8, 0x8b, 0x0, 0x0, @fd=r2}]}, @typed={0x8, 0x11, 0x0, 0x0, @u32=0x7}, @generic="af86cce6cd7580740ec70e88abe9555287b5b40efc11d0b9950b0ed0f61ee7f3960b90a23064c7467d3e5891337ff5e2a350180eb00a000bc675516df1177c1561d0539a629f6c33c09a5ad30b2a8fc1352596f117b76119a0a60280e4feac4f118830987172f893710517b7bcfac07737a7ff155131d1a8e4707add3adb9875742a8f55754c4cbde0c8dd4e218aabc3168128d8ba03871eccc79e074e5c63ef7fd090ed5715f8026b7ee4d929342fa1d57ee11fac0d4645e383693b50446ad75f23877636d412c4425ccfc0eb773c", @typed={0x14, 0x3f, 0x0, 0x0, @ipv6=@remote}]}, 0x1f8}, {&(0x7f0000002300)={0x13ac, 0x1a, 0x800, 0x70bd2d, 0x25dfdbfc, "", [@generic="158cab4d987d3b984c1e6745f43552cf746f232983d0159eb9cc8d5d886eb1879059fabd7bf35d2fea6cdba5502c7d30a465c54d4dcbc7d6ec61b2744a6da5c673059faafef17826f6c815af6cddf3f55f987bbd4a3bd4ef5b9732fccf1b9cec559b690c6401a726feee5ee4a40bc2deefcfedeff90defcf6107429372205b0bfc73558b", @typed={0x7e, 0x6a, 0x0, 0x0, @binary="dbe9aaf11ea440ca2137afaeeb485876b7689a705aac0f652c9181af57d0680c5edc742214dad98db02a445ef40ed30c77b602bf77d094d6b9921ac49e1da8dfd3b730cc883a7cf307c3f84cacc961d641a2a47c89390ac1745a079645911b6a50495faf3676288a920d9b50ccf89dad11a9ac27537b531d086f"}, @typed={0x8, 0x77, 0x0, 0x0, @fd=r3}, @nested={0x106, 0x5c, 0x0, 0x1, [@typed={0x14, 0x61, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x1b, 0x0, 0x0, @uid=r4}, @generic="20b79af6e9587fa12044d7654780b38de0fe1032c5bcc6402dc1a56de54cf60ee132c12af342c93ddeb98feb0319f4e0260ad91a792213251e93a9c862be667fa7815580fd4531d08b824e489835a845b25f479baf88b559378c21929b9cc2c99c789b77071b7a64db21bac4e474549e3b1397866ee95263fd26d97a365fed8ee77ea4a155ba3cd900c173f95b3636f735a0234c0627c8d2b76fca22d8c7045ddfcd1030be532bcc0152a09c78143416b90a12f6524b68b92681d2eb0f2d1c189cc49015ed26ee3496e746bf4d3636b14bf60bd966a6e66ff654872c46052f16a5a108c161eb"]}, @nested={0x5b, 0x19, 0x0, 0x1, [@generic="ab29b64e73264e4c21167dfaa0a246208e2cc3bb78429ff2089fc4a4dbcd63927338dfe51121d3ec1fbcc2a2f040e65a8f41063accebe418f6e3345508168eb1a5a4d0deee9f49c04e93c9718f03643b4998fdb549501e"]}, @typed={0xc, 0x3, 0x0, 0x0, @str='keyring\x00'}, @generic="0f37b2e6085a061cb1083a8b8a1fbbb21d35de5ec47721eae72f5fde76e5efe35011bb9f6c7233038f81994e0eeffe7c01b434327fccade173a001b8bec74bd24ac08ef19b2643b291b6b30f12b78675067441294c377442679b5f7c63736d1d555b3d1094cf0d6032edb16d1351a7a09eeaac51fb1764f835f012e8cb25cea6f8567d581d0627452a169b57cc68c24f397c3ff4ba9484143a65609684030172433fc72844a368537cba675dc8e7c3ffad72670f4e33ccfff499666be14e377818cb0973e413b28132482c255fd9e1004e209fe8ea8b33b8a30019ffced53d3dddc6f0e37510ed", @nested={0x102d, 0x65, 0x0, 0x1, [@generic="0906430e7353cc5c2920b13fb0c47d3b6f83c7190dadad73980c592155cccc5b2ec1c73a1c310ff4d1776943aea7b63729be84cf503c640a4385fd0a8fb7460e773b46edc8b301d4b369da903e4714365d7ae5de144890fb555aef4ae9de6de783578d13c2bab9ac3117ea33714a5a7bc9df6560cffab150eec279894ce854b549ccf71273afb5ed298a6dd5c4a1fcd521a4879c3ab0fe5cb9e49f3beff07fbf5bdb37eb1758037e4267581f095fc84eb156aec5a67b6785ce19bc06d5ed82715bdfc509347d40a3a89bf3af2d824ce3a8185b453fa5669b80d66235d564bf1dfb1f19851c73e31d5f71334ce0ddda099b7bab2c3a8b64cdb76773f4248a5ff343ea8317560e68f6e6f72a60b9cda52374ade2117106c7053b0e31d3139ce439fd117407ff673def7ad3d844056dc2b08f83cadec9cdd6b4c4b065098c6ef549019b4e88338b85fd07f8ce4d2819676632ce13a3d0cb5d8165ae4239c6f8030b1d787760c7cc1a5b27b50a4e32f8161fcd8bb2943073c2f337bb37a6e68f8038d98e57874bb729112f64a8696d9cf90f54b53e2b1603304e3b37796c52c6553007a170347dad51ff1477aceb0d3ab10db0f6017a9da80eb68d541ede940fd30978fe8e22070d16c602318d2a232b48bf82efafd369666af110bced9b50cc6df934a430bf3d749678834cfb30dccebb3c75192640cb468a7e742bd9f59c195a1afe560f2f4075f1c4633b6b756667c9261c888eec6bd3c8cf54aedfed5f663f0d33c3e0af11659f2d711d5d694b2b68edade125268932af6914d9acb944548e6299790ffd966ccdefb49286a3476a35e52d76ab3c62feaec2af2612a9eaadc9716d76dc87f69c2787a117eef3fe4333728fe492840d7540b26880d6601aff5444e095c5cec54067946aa1ffe54d9cc6aaf75e5da7c3b0c16d962c6e3721b4ab714b9aa307df17d8e4b816c7b8b367fcb2aaed7f857d0da9a65a04c295ca7b2134653e0ac33556553fce77889029ee8b9ce9de5f5d1db95e04897cbbda1377e0928c7a0223821f53947c7e92b13c4da18f9dbb406a703bd14f5c2388eb215c8e1617ac043d98cec5cce6cd4be25464680b71ac1bb6aba8fbbfde20414162e9d92506e291c26aab76716b475e0d70ac49e8268f08205577011f03d35333ce0a48630cc667419a6c500fda47268c971f5e2add44a54989fa3a84572787aa2da65e78d0b18d024acaf594b9d986cb778fd03e1f50874e8dbda26395d3ea018fe37d318303ec92eb4a64bb8541c5dcceddafe4c8aa738e9b9bf42c45d0ab8c5442e6c74646e6913349adc965647a9750881add405e3d73d23d983d92fa4f8eb0b6721a2b214d47519869d05c6553f58ee09befbf17d23a37f84a8dfb051d6e20aa27642a4065aa1447ca8d6931e528760c873447cba51826b36e8fcbf6eae477927da9300ef0be18c13be6c7090f9626d3693f0d1927a1e5a784522005acdff2286ee10affcf23c4c26efdf16b4a646caaa85b15b5b5fb28d59d872d58e3afd9dea57e8c564e4694ecef846cff042f028947be7c3207338824ebc53bb43dc2a6f1395c80ed74e6bf7abf9dc0c29cee12f7cd7a005e9ef8d51299494398c7e632b69d040100ff99b42ceb1380f33d352cf7d02b13a92a76c49bb3799432fa0a305d3f485dd7a80afb698ba8bfcb73f2f68928133ef282498fe10b5cef770e644419f988531de53410fac43a5580ed4ed1e42901febea55abc924ad25132c56ef4e2247c8485e6987b9f8db52ffaea6a0ae7541ec388e8285ad6b461bad86806dd227ed2ceead28530fe9826a593ae9e4b74452896b0936eccc16895eb8a9ed9114707cf7d17dc5df83be652caa896d6ce7dc557bf695cecdc22c7f87aac455ddc4c3c34d518d8381a7c691a06c0091ffc7a6d423acdc0bf82663b4ca8f4ea268b90a05e6b80709f014df1d192869692270efdaa099ca41f8eba3a9ebd0103ffd7eb1dd35c922108a44c830491a1a537927c9fc3930a205510b54cefe6d3270c3f745bddf27aeac5e215ab8ec1bbbe92298e871d8c0321320535eee2d04675a1995402f8c5cbf4cc138476c435764385f4155718d8db6b73f2b25e5a0e3f817d314f15ad05eb5091a4214dd013160f944ba3c7ec27f714823470cbd285da863facf0af9a64aa191b71079f19c6346fb98ff7ffbe310c5ea4c2c93c2a21f5215f55be8e7049e3f7e5073691c4fb3e7f2db9ac37c7e65052145543c8e258e716b680f5e2f09824137133a7b030295fd5bc6a648084ff7b31ffec880b3510f0a581b27a239d502b8bd881bd4c0355b78a10f9f5cfad789222564786a012d63e6689bb95f007a9d8bf68e1fdb82b0a08666fa980463388128d4ade42d4b15c74517e1537fa2b19e251b441ff3ab8eeeb0329958632d710f9ae73eacddae642fe7e648362eb070b00eae0adc4d3aea46d34879966cf035763c4c9dfadceb95dfc5d753c91195918d8741f9fddc6de4e4c75ad75027a28563061152d589ae2020e213ff18beb25c4cf0210ebbf188a9ef9cc7cc9d404ed8ce6f3a8fc7c638e91d499b4d2898053db17416e9f870492aa0f44f3437ec08d2eef3db4775208e3f7c0ac730fde28bb4ccde8ceb3e2f8f7dc4252219ed514a678804d6d47e7096b089266b2dee9364f6fd10061fe84afb1c9be8ef1f5f7a2b94ee39a589ae953378df3919b5801c44dc555ef1b912ed96aba6c15350780ecaf7006c49c8ba9f532d7506543bce6b41c4b614aa7c6485cda7266944df9827a35f9daa1d31b7d4be2add9128eba36e59e578099afc0db9e6c6cd991a573800df4a3b020799be76290b0a86c0c73b7392b95796c691563b25f5b0334eff1db55ac64382d84d5eccdadb27558b422d0df6ca341f6442ad8e65b9dc1a04acd78a97829e5020745daa1e9d1149b65d1cbcdc9b881b3062d73419905d4598ec92aa2582e478a3321fde112d12c8c7543592bc5797f81e2d6c4221bfa0654f817d7cb4fb3604f1c3e7fb57ed26382ff114d707850919cbe75e700cfa0784cf6aadea7685cce76c32b3baed0a6eb1de4af8468ec9c46c9a18e2cad4e760d204b488fc8ab9d1769455e5a103152d123952bea7085d48378f8443cd91f92ad0cd0a73d6bb4977c613630d27d6cca17e846c81c20ca6085b323916780a19a37ea0b848ae35d307ad6e03561ed75abd3624c3a6387b7cd6318027653126d981718158cb9eac23d22c34aabea150ed3ac824927ec076f8fb5ed6f840fa5bc98b59fee3b55a7ef6551b4e01105be295a1b2623adb980b57913c6afcb18894656059c35cba0cf252d7d4a93b4fb2c9e96624a9620e383bb31a3672a11e7dc2f5f46da0278bd8282f6da94ae3a70a6252a1b45468303fc8f1fb5703adc570954789ee04cd4163afc5f443a983bd97592a3392c1e7f2a31837f9d3c164a2fcd59dfebde61626f1197dcdafb40f3960fa40f22803029704b157886e61d285752ed74a4f3c16a3f90e80521f1bfdf4da7e2b1f95febb9de8cdb8698dd5fbbdf83462b5909dd3d6ad56faefbdd4d0ce59f0e952cd3430d49d7a9b22095670e0fcba8e1c1086acd2713f7be91ffa3ab6b86eabdfe5ad4fc41d6352488ca8a9207c4877567fa7bcca1210049318808ecd0f25296aa44592421f3ff70ff0175bcb0722b02ecc099a4baad2465998c61962ea93aeec2120fec05cc649e99e660f7665a87a2ca523b717590e8f45f273c16de948ea5b7fbfcd3582a25c3ec1ebf8621cc43e6ca6513be2d7b257521bcb6157d40db681404b118a1e0f37e134a680b7d737b66fdc8f54921835fca09d05e142c429e856c6121ba8e358a165dbcd10516b209ab641b9807f5c0fe76c7a3249cddd62450f7a4050edab8e179a1e067a6e01c475afeef0ac96146e9a9fd5c099a6ab02a32493db962a65772b5779c6b79ba33151bb6771bd3d6f475c11c66f4c21f401d7a045633543dace87b368a43df858a1897c9ce021168f56eb185bffa5c10748f9f5dadc297ed6c8285fd5419706c718d8a80b6c8e3087e247946df37d6aa251dff6539fbfd2c727a877e9b03b4a89b415106d89ec9d7c80a8661e4914a0c752e3324147a2878e41f9de1ceac4cbb9a2c4444a536527a48907778cd30c4454a275f0cee13cc3fe2f4383bd088cf9ec396e0054ad052e7c70d70c8a7ff64381c09deb093e8d9cddcb5033133e245f05ca1e55f6ed9df3c102b65ab0bf642ab3bdc25f0aa9f9b0484dfb4e7027f7ba6324fc23143781b48d71825b43a1c401c72c081861c6e35fae4c586e614a73867c38f1510aaa028743d334cb1b89002895f43389be6a18c1eeb6dfca7398e4c140cb4c26dc6c172e526b1096df6699187673c11f7b588e09e447c068fe47adae057a0e8a83beb2d6d5c1b7e624b60fe107a06ba5dc4c311bbb131440faeee46a25207de07cf06221124300c8721476e3a935940acdad5dfa00cec9250eb77990f94ea952d9fe01c4a792e5025eaba7c3f0e31d7889eca57457ab88f79ee89e036714d1320a692ce7a63478ec59d67b779d8b158f21436d51e4b65a757299e65bebfbed330ec055e69b5d1142a6e4ac0da7f0159e05c41310962d418846b92170fef22a78b0469cc1629fa01719e18fdbb819a63c7e25b1afb3c552c701c4699b398d9bd4a7c6690b95aaecf574528d37b0649fc7732652f5eff54900882bda6b5930aa85334ee964c1d6235a0cbd66c22385dac6672d49c2bc6a053ead49d4aadcfc23a00027ee92687ee7a63987fe48a0b89e926619e9284e012921acec41b322596bc3278979a0630734eaa03700d87bfcd0c353a2443cef99f6696cb01ccf9532a220faeec3dd50ebe71524b48870e9e334843f037ce88cdfe2ca43f5b27edcd98b18d5182d3d66af4fe6fb0c433065470b24c1ba4bf40f4ebc629c8510f53bb2ab83191de0d9e28d2c68ce874aadaecf3e2e7aa147e438852b2e2d7bb065b06c346fe17aebc7a99da4ce5b42fd762364e2f959ed1a8af0b6235d2f96eb6c052629fad973543e109ac1ed36f807eb5bd768a513255336d6e5ee003398a182f1ceba96a5012a23f8a64ff9cffc568e291b8fb52f3cff31b2cd249381f467c9e72fb8eefdf8e1d7443eb548d0614b9bd6e5049576f3779cdec0ed48e0ad1e7a81a219a94c78a12cfb82cc34babd04e7a765e31a3d305b685742d1a88395084193c813ad2f6ad096980030d5c005c8934366422d8978e8a8151154d56cc2528dfae87dc842f1da42aa34b6177053e6ba2f488f57651633d8508af03ad5df766860d337782533db5e3700072e871378ca2acfbd69206707e1a8abb23b20382833fc5822081c8c75ff771d9789d9c53fa148cde4ce4c96ff4373229533a6e956649af4a6fd5286c4b0bf79928d239b1e78f72ab55b4e46d538e46b0034872d43f3e7390a6775690bee83e82884e4dfa64973176cc05ac821c0413a2e96b2e17d458053844ffbbbfe51c152d43e7501d02fe39d5c2714bf98959ca705b71d49fc852962c9ac6bd00f0d47cbb6619b6dd4dedf21698cdf9f6e91124493546085286e1841eb266926a51d4e7a9cde55ea572bd76e8e7ada793d9cf09d3ede1f94a0a58f67165245780b51270cb78e6d6b1b0346897ad3e22c1a2843d36662f3c20709138b1ba6e0deb6a6ef85759071d6b7e26531969b2a6970caf83d7973eea3d31e0cdcf0a847f44468cd8fc0d6efa8b9022720dc611b8964f2cf69d7db7f9c341c8ac3e6c9e669c465e2b319804ffa29cbbb962978a7ae7ac3ff6bd", @typed={0xc, 0x64, 0x0, 0x0, @u64=0x1}, @generic="af2c315578518cd5d4473bf165600953566b5b7774e3b469fcb6df6088"]}, @typed={0x8, 0x5a, 0x0, 0x0, @ipv4=@multicast2}]}, 0x13ac}, {&(0x7f0000000440)={0x18, 0x20, 0x400, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}]}, 0x18}, {&(0x7f0000000500)={0x108, 0x2c, 0x2, 0x70bd26, 0x25dfdbfe, "", [@generic="c63bc4071cbb5e61f3f6b30878a93fc9d55bd04ea120445a82b7bd5aca55032b74c934915ab1018111008a9ae6f06a548e73c471de9b12df9357a285baa78dec6060af018cb29033979b73726845f0a7a11309c697a12552d994236a3ea94f91f52e5dc1f377571483f565653650a2b4be01a4214e0d2fdef6fb6628a9ee31e4eac730cb1d4069a53428b1ecb09d8fbee357110c963784c0406f415c74ae52d74119ebcc4520b38f01b30468e34aa75c3e52a9a02edf339bf633014f2a56160af74f1b6f658aa61e39ee3c965100b68c68c8fa1d22430a", @typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@local}, @generic="9b09663ee0a5a12d6bfba04a"]}, 0x108}], 0x4, &(0x7f0000002240)=[@cred={{0x18, 0x1, 0x2, {r6, r8, r11}}}, @rights={{0x28, 0x1, 0x1, [r1, r1, r13, r14, r0, r1, r15]}}, @cred={{0x18, 0x1, 0x2, {r16, r18, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, r19, r20, r21, r0, r1, r22]}}, @cred={{0x18, 0x1, 0x2, {r24, r25, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r26, r27, r0]}}], 0xbc, 0x4000004}, 0x21b86f864e44c92a) sched_yield() r28 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r28, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r28, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r28, 0x0) write$dsp(r28, &(0x7f0000000000)="02b30b945814db89b1627d9781e59821e47d3f7f516c3ed32cb6388088c2a0639f7846f33edaf1eb9b890e881cf2f29dc81c", 0x32) 01:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 325.632041][T11841] IPVS: ftp: loaded support on port[0] = 21 01:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000800)='./file0\x00', 0xefc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00']) 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:36:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) [ 326.158809][T11841] chnl_net:caif_netlink_parms(): no params data found 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) 01:36:57 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x1c, r3, 0x90fc047e054328f9, 0x0, 0x0, {}, [@NL80211_ATTR_FTM_RESPONDER={0x5, 0x119}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x44, r3, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x9}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000841}, 0x20) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 326.529739][T11841] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.538284][T11841] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.547803][T11841] device bridge_slave_0 entered promiscuous mode [ 326.608410][T11841] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.616263][T11841] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.625879][T11841] device bridge_slave_1 entered promiscuous mode 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) [ 326.723940][T11841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 326.803486][T11841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) [ 326.909177][T11841] team0: Port device team_slave_0 added [ 326.941265][T11841] team0: Port device team_slave_1 added [ 327.048053][T11841] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 327.055508][T11841] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 327.081980][T11841] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 327.178738][T11841] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 327.186004][T11841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 327.212264][T11841] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 327.369836][T11841] device hsr_slave_0 entered promiscuous mode [ 327.473707][T11841] device hsr_slave_1 entered promiscuous mode [ 327.532216][T11841] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 327.539852][T11841] Cannot create hsr debugfs directory [ 327.813747][T11841] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 327.864961][T11841] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 327.964522][T11841] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 328.064271][T11841] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 328.475589][T11841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.521433][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.531421][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.558024][T11841] 8021q: adding VLAN 0 to HW filter on device team0 [ 328.587714][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.599261][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.608725][ T2701] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.616911][ T2701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.662371][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.672527][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.682944][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.692556][ T2701] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.699766][ T2701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.708735][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 328.740164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 328.773895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 328.784346][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 328.823079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 328.833099][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 328.843760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 328.862675][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.872464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.903083][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.913170][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.932800][T11841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 329.003956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 329.011744][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 329.053904][T11841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.137633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 329.148722][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.225324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.235131][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.259991][T11841] device veth0_vlan entered promiscuous mode [ 329.273941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.283438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.333540][T11841] device veth1_vlan entered promiscuous mode [ 329.417145][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 329.427052][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 329.436625][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.447152][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.472549][T11841] device veth0_macvtap entered promiscuous mode [ 329.495312][T11841] device veth1_macvtap entered promiscuous mode [ 329.560911][T11841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.571640][T11841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.582236][T11841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.594134][T11841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.608312][T11841] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 329.617855][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 329.627972][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 329.638524][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.648731][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.707667][T11841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.718299][T11841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.728480][T11841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.739089][T11841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.753706][T11841] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 329.762463][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.774620][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.570396][T11901] JFS: Cannot determine volume size [ 330.576198][T11901] jfs: Unrecognized mount option "audit" or missing value 01:37:01 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETA(r12, 0x5406, &(0x7f0000001400)={0x4, 0xfc00, 0x400, 0x7, 0x19, "5974ad1af6bd3367"}) 01:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) 01:37:01 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000000)={@multicast, @dev={[], 0x2b}, @val={@val={0x9100, 0x5, 0x0, 0x2}}, {@can={0xc, {{0x3, 0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, "4349acbc498e44d3"}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:37:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x24e, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="6000000024001d05f3a3a94f4ea77fddffffffff", @ANYRES32=r1, @ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000000)=""/107) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)="8f1f014a56fae5d76916037465b5c313ec615c021e3efba199008c822ea9dca2cb36db0a5e3a8066600aec0c3dd4baec44c19e47cba50202b6e48e67527b8a0aa7b874d169bd971234ba5fc38f33dc9dfe8e810b12dbe8b9ded9fe78fbe398cfbf4876cd93c4898460afc0b713d409f4a34e3283cb9576662066d55000f22fce9ef2c6daf22321a45bb95f264b6e6094be38bca763e61931fd3dae5f401222940d48b59f81cfa52ad71e77b7021750", 0xaf}, {&(0x7f0000000080)="2f366d81e443878bd1bc821c34f644ff2fd9e0cfe5acdf4b56b4400d27f1f77d36cb6b4c", 0x24}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f0000000100)="0eea72013772179e4ed07c3aeb8ed9a5a3ab53aa1a7cc5ef74dffd7f93411efcfa86fd00253b3a169e07b5bbf306577979e3c942ecf4ba58939ec31fb4f6f4874989ad054365843fe2acd37c35110f0def3e2df66e", 0x55}, {&(0x7f0000000380)="b12c3f6840351d05a429140875ef732b327e1a823fb309fce1212c46d088d37c0097beed3e86d6c98bd418ed94863002928d31d8ae450082e28d122073a1336d0db2dc85eea1c442255d40b1056c2452dc1b613fa9144f28b4a805a8126548ac02332fde676f5e1fa8da5ba8c6894f270edc2f485069b5bf8f71cd929134f18f8ba699cd817d695525fc0d6f0fb5f6248a30972ec9f3f7bb63eeed447182a365088c2bafc713cb2f71c361a84f2529ff2e7514203020eb98b64a65e8", 0xbc}], 0x5) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x40ee21efcfe43b3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r4, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) accept4$bt_l2cap(r4, &(0x7f0000000200), &(0x7f0000000440)=0xe, 0x80000) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) ioctl$VIDIOC_QUERYSTD(r5, 0x8008563f, &(0x7f0000000000)) wait4(0x0, 0x0, 0x0, 0x0) 01:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) [ 331.137692][T11918] JFS: Cannot determine volume size [ 331.143801][T11918] jfs: Unrecognized mount option "audit" or missing value 01:37:02 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETA(r12, 0x5406, &(0x7f0000001400)={0x4, 0xfc00, 0x400, 0x7, 0x19, "5974ad1af6bd3367"}) 01:37:02 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x121000) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x2}}]}}}]}, 0x48}}, 0x0) 01:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) 01:37:02 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0900000000000200643d35b18df1c242032dc120c91b87d1396ed7a275c4717ca5ffe3bcb49ad886d5994c687c57855a581f64c495d63ae9df7118b90fc7ab2eab207b6a9dd949f379550d31a7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xa004ac, 0x0) rt_sigsuspend(&(0x7f0000000040)={[0x0, 0x4]}, 0x8) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) [ 331.672937][T11938] JFS: Cannot determine volume size [ 331.678293][T11938] jfs: Unrecognized mount option "audit" or missing value 01:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 331.852662][T11944] fuse: Bad value for 'user_id' 01:37:03 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETA(r12, 0x5406, &(0x7f0000001400)={0x4, 0xfc00, 0x400, 0x7, 0x19, "5974ad1af6bd3367"}) [ 331.908875][ T32] audit: type=1804 audit(1583804222.957:59): pid=11948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir310628109/syzkaller.haGHIt/17/file0" dev="sda1" ino=16540 res=1 01:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 332.169620][T11952] JFS: Cannot determine volume size [ 332.175320][T11952] jfs: Unrecognized mount option "audit" or missing value 01:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:03 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/sequencer2\x00', 0x0, 0x0) [ 332.551152][T11965] JFS: Cannot determine volume size [ 332.556953][T11965] jfs: Unrecognized mount option "audit" or missing value [ 332.645872][T11948] fuse: Bad value for 'user_id' 01:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:03 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20\x00', 0x1a1900, 0x0) 01:37:03 executing program 1: ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0x3], 0x0, 0x0}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x9}, 0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d01000000006b6b6b00007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000000)=""/107) readahead(r1, 0x5, 0xffffffc0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 332.938458][T11975] JFS: Cannot determine volume size [ 332.944186][T11975] jfs: Unrecognized mount option "audit" or missing value 01:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:04 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) accept4$packet(r11, 0x0, &(0x7f0000001340), 0x800) [ 333.085782][T11979] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop1 scanned by syz-executor.1 (11979) [ 333.205621][T11979] BTRFS error (device loop1): superblock checksum mismatch [ 333.243078][T11979] BTRFS error (device loop1): open_ctree failed 01:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 333.414801][T11989] JFS: Cannot determine volume size [ 333.420234][T11989] jfs: Unrecognized mount option "audit" or missing value [ 333.434194][T11985] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 648518346341351424 transid 0 /dev/loop1 scanned by syz-executor.1 (11985) [ 333.547566][T11985] BTRFS error (device loop1): superblock checksum mismatch [ 333.573530][T11985] BTRFS error (device loop1): open_ctree failed 01:37:04 executing program 1: ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0x3], 0x0, 0x0}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x9}, 0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d01000000006b6b6b00007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000000)=""/107) readahead(r1, 0x5, 0xffffffc0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 01:37:04 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) 01:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 333.923792][T12006] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop1 scanned by syz-executor.1 (12006) [ 333.964852][T12006] BTRFS error (device loop1): superblock checksum mismatch [ 333.976678][T12009] JFS: Cannot determine volume size [ 333.982500][T12009] jfs: Unrecognized mount option "audit" or missing value [ 334.030551][T12006] BTRFS error (device loop1): open_ctree failed 01:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:05 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000001300)={0xa10000, 0x3, 0x9e6, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0x9c0904, 0xb2, [], @p_u16=&(0x7f0000001280)=0x400}}) 01:37:05 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xc, 0x31, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000d96000/0x2000)=nil, 0x3) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000040)=0x2c2a) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) [ 334.360180][T12021] JFS: Cannot determine volume size [ 334.366321][T12021] jfs: Unrecognized mount option "audit" or missing value [ 334.478009][T12027] mmap: syz-executor.1 (12027) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 01:37:05 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) 01:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 334.738542][T12031] JFS: Cannot determine volume size [ 334.743982][T12031] jfs: Unrecognized mount option "audit" or missing value 01:37:06 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) 01:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) [ 335.235331][T12045] JFS: Cannot determine volume size [ 335.240667][T12045] jfs: Unrecognized mount option "audit" or missing value 01:37:06 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) 01:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) 01:37:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) write$capi20(r0, &(0x7f0000000040)={0x10, 0x8, 0x41, 0x80, 0x6, 0x1}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x882, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x16c, 0x1, 0x9, 0x801, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFCTH_TUPLE={0xa4, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={[], [], @broadcast}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_STATUS={0x8}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80}}, @NFCTH_TUPLE={0x98, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20040080}, 0x4000080) ioctl$VIDIOC_QBUF(r0, 0xc044560f, &(0x7f0000000300)={0x9, 0x1, 0x4, 0x2000, 0x7fffffff, {}, {0x5, 0x8, 0x0, 0xb3, 0x3f, 0x3, "89a4c762"}, 0xb36, 0x3, @offset=0x7f, 0x7, 0x0, r0}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3a799d01, 0x4) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06055c8, &(0x7f0000000380)={0x5, 0x4, {0x52, 0xff, 0xffe1, {0x2, 0x8}, {0x2, 0x1}, @ramp={0xe613, 0x1f, {0x400, 0x40, 0x1, 0x7fff}}}, {0x55, 0x3f, 0xfffb, {0x40, 0x4}, {0x1ff, 0xb2c4}, @ramp={0x1, 0x8, {0x6f, 0x1, 0x489, 0x3c5d}}}}) r3 = syz_open_dev$vivid(&(0x7f0000000400)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000440)={0x3, {0x14582e3, 0x7, 0x3, 0xf04c}}) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f00000004c0)={0xc, {0x4, 0x7, 0x4, 0x9}}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000000580)={0xf000000, 0x400, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000540)={0x9c090a, 0xff0, [], @p_u32=&(0x7f0000000500)=0xff}}) write$FUSE_WRITE(r5, &(0x7f00000005c0)={0x18, 0x0, 0x7, {0x10001}}, 0x18) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc044565d, &(0x7f0000000640)={0x7, 0x5, 0x4, 0xe6a5ca1f09b39403, 0x1, {0x0, 0x7530}, {0x1, 0x2, 0x2, 0x5, 0x3, 0x8, "c8c086d5"}, 0x3ff, 0x3, @planes=&(0x7f0000000600)={0x7, 0x3, @fd=0xffffffffffffffff, 0x3f}, 0x20000000, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_S_EDID(r7, 0xc0245629, &(0x7f0000000700)={0x0, 0x100, 0x1, [], &(0x7f00000006c0)=0x6c}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000740)='/dev/nvram\x00', 0x8c00, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r8, 0x541c, &(0x7f0000000780)={0x6, 0x30}) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x4c002, 0x0) ioctl$VIDIOC_G_OUTPUT(r9, 0x8004562e, &(0x7f0000000800)) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='net/route\x00') r11 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0)='nl80211\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r9, 0x8933, &(0x7f0000000900)={'wg1\x00', 0x0}) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000b80)={0x0, @rand_addr, @local}, &(0x7f0000000bc0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c00)={0x0, @remote, @multicast2}, &(0x7f0000000c40)=0xc) sendmsg$NL80211_CMD_GET_SCAN(r10, &(0x7f0000000d40)={&(0x7f0000000880), 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x60, r11, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x401, 0x4}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3ff, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3ff, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x8010}, 0x80) r15 = shmget$private(0x0, 0x1000, 0x54000000, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_INFO(r15, 0xe, &(0x7f0000000d80)=""/57) r16 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000dc0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000f00)=0xe4) fstat(0xffffffffffffffff, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r16, &(0x7f0000000fc0)={0x78, 0x0, 0x2, {0x4, 0x8, 0x0, {0x5, 0x9, 0x1, 0x401, 0xfffffffffffffb5f, 0x0, 0x10000, 0x4, 0x0, 0x336, 0xe42c, r17, r18, 0x6, 0x10000}}}, 0x78) 01:37:06 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) [ 335.607498][T12057] JFS: Cannot determine volume size [ 335.614786][T12057] jfs: Unrecognized mount option "audit" or missing value 01:37:06 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) 01:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) [ 336.016554][T12067] JFS: Cannot determine volume size [ 336.022346][T12067] jfs: Unrecognized mount option "audit" or missing value [ 336.151009][T12075] JFS: Cannot determine volume size [ 336.156655][T12075] jfs: Unrecognized mount option "audit" or missing value 01:37:07 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) r10 = syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r10, 0x4010640d, &(0x7f0000001240)={0x3}) 01:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) 01:37:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) [ 336.645699][T12083] JFS: Cannot determine volume size [ 336.654345][T12083] jfs: Unrecognized mount option "audit" or missing value 01:37:07 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) 01:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) [ 336.786291][T12088] JFS: Cannot determine volume size [ 336.792386][T12088] jfs: Unrecognized mount option "audit" or missing value 01:37:08 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) syz_open_dev$mouse(&(0x7f0000001200)='/dev/input/mouse#\x00', 0x10000, 0x40c000) [ 337.048545][T12099] JFS: Cannot determine volume size [ 337.054408][T12099] jfs: Unrecognized mount option "audit" or missing value [ 337.065938][T12095] IPVS: ftp: loaded support on port[0] = 21 01:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) [ 337.276012][T12104] JFS: Cannot determine volume size [ 337.281562][T12104] jfs: Unrecognized mount option "audit" or missing value 01:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 337.781378][T12095] chnl_net:caif_netlink_parms(): no params data found [ 337.982017][T12095] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.989900][T12095] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.000924][T12095] device bridge_slave_0 entered promiscuous mode [ 338.025417][T12095] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.032881][T12095] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.042696][T12095] device bridge_slave_1 entered promiscuous mode [ 338.097128][T12095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 338.117435][T12095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 338.170485][T12095] team0: Port device team_slave_0 added [ 338.186584][T12095] team0: Port device team_slave_1 added [ 338.234630][T12095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 338.242243][T12095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 338.269423][T12095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 338.289541][T12095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 338.297057][T12095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 338.326622][T12095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 338.488248][T12095] device hsr_slave_0 entered promiscuous mode [ 338.532949][T12095] device hsr_slave_1 entered promiscuous mode [ 338.652179][T12095] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 338.659920][T12095] Cannot create hsr debugfs directory [ 339.001794][T12095] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 339.056495][T12095] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 339.155777][T12095] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 339.265030][T12095] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 339.671386][T12095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.720849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.730818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.759821][T12095] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.791802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.802194][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.812298][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.819705][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.873752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.883740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.894069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.903668][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.910876][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.920051][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.931142][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.016432][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 340.026512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.036290][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 340.046161][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.056245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.065737][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.075197][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.084258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.107262][T12095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.183194][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.192926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 340.200820][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 340.240997][T12095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.324532][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 340.335849][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.417600][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 340.427372][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.458684][T12095] device veth0_vlan entered promiscuous mode [ 340.468782][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.478366][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.530761][T12095] device veth1_vlan entered promiscuous mode [ 340.617503][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 340.627062][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 340.636926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 340.647005][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.673646][T12095] device veth0_macvtap entered promiscuous mode [ 340.697989][T12095] device veth1_macvtap entered promiscuous mode [ 340.761411][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.772059][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.783366][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.794522][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.804522][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 340.815075][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.829122][T12095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 340.839642][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 340.849897][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.859482][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.869642][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.900807][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.911435][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.921986][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.932584][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.942521][T12095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 340.953351][T12095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 340.967484][T12095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 340.976732][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.987525][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:37:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) unshare(0x40000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x84c8, 0x5, &(0x7f0000000500)=[{&(0x7f0000000140)="f867b1ee16bd473bc8d7614dc89b0c3caf8306ad9e70a6f9bd751f9391674e00ea9f4d48dde01bd4dadbbec2f176f3cc3a84e0d6db654cb15c3a8d0ce65fcbea091de25d41d393889d9535582bbd4c6d6ad276a79d3413de44c2e61765e23141a6a1f5c8abe9628ececb1f333ee94351efb6c841cdc5b734b31684d7e8c45d0b80b272cdcfaa5464bcfcbb25a626692d8ef10c927e6b", 0x96, 0x2}, {&(0x7f0000000200)="965e29c5819b98d157d52d3d7de6f77828516072b54165134371c830acd2f9103168f9fb71879d670a3bc4b690d295d4487f9af62969a698200fdf2db5d1671cd6ea5d1c8d40db1fd19ba2f4e1be7d3da83674b42d76aa29820a51e4964d9cd2cdb0c1e7ac56f59517e830f2d1f73b125f75ba24a15d71dbf8d91d6cf19231c05d34b5847aaebaafb88e330d5b100d59055f3d65414c83148d408758497afc6fc92e068ae93f8688affa280fcd741f4bd6dc81b87d2d9e42b6358499f96722f300a9d34d51ff33ef08f2b8d0cc46fb9da546fb42dc834e0b148b7bb7721912022d18fc665907c764e9c2aa9fc806ce4ea125bb6e90", 0xf5, 0x4}, {&(0x7f0000000300)="06d162f36a5b2591e4907a38ad6422f0557e49205566cb88722f077872f62eedca1fe2404e7ed1a7f161969696ea1b661accba327a97d8681cf27e0d7b1093e3965e9ca227715223c8d44aca8145e6ec246df1a96a85cbf28b89025835c36092207181ac8fb446ffc53ba84a5850a88c15e7f1ea28b0f57590005b3735b1511890f632bbbe26bf84e2a5aef087cc341ade786ac98d4a6b4fcf5caa785aa193f54e", 0xa1, 0x400}, {&(0x7f00000003c0)="a1f9e1cd215fe4da2c98878e865be6bbdf79649dec108ce135b5f56dd5e8696c435c89f2fd5cfb462fbd003d595753ff9ea39502af2eef60d763eba6319b9024612f27e8665775350b88f6f95381472fe22cb09b1fe42cd4ed2d198b2fd951ede87fa5d86f4ad65efc1f40d8c5f8088c2eaf4b8ba9e4d76ce32b51960d6c7d3bdaf0da00c5f90cfe5ecb839f6e8770332e5b4ecb9d32eaf2b57e8f86188adbeac22962dfcc909ebc04c30c540043305a53b5e65ef07440d3628808934a4c8e235a5a2e6301dd7818e9aafeef", 0xcc, 0xfffffffd}, {&(0x7f00000004c0)="81545e0ef8225322ab66fc2d676572f968e2ea25cb7a3b591de9ed893dcf0067", 0x20, 0xf9f}], 0x20, &(0x7f0000000540)={[{@fat=@flush='flush'}, {@dots='dots'}, {@dots='dots'}], [{@dont_measure='dont_measure'}, {@obj_role={'obj_role', 0x3d, 'mime_typevmnet1]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0--ð0'}}, {@dont_appraise='dont_appraise'}]}) 01:37:12 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) 01:37:12 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000001140)={0x4, 0x0, [{0x5000, 0x55, &(0x7f0000000ec0)=""/85}, {0x2000, 0xba, &(0x7f0000000f40)=""/186}, {0x4000, 0x4e, &(0x7f0000001000)=""/78}, {0x5000, 0x91, &(0x7f0000001080)=""/145}]}) 01:37:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 341.906184][T12150] JFS: Cannot determine volume size [ 341.911613][T12150] jfs: Unrecognized mount option "audit" or missing value [ 341.950007][T12153] JFS: Cannot determine volume size [ 341.955573][T12153] jfs: Unrecognized mount option "audit" or missing value [ 342.043303][T12160] IPVS: ftp: loaded support on port[0] = 21 01:37:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:13 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) [ 342.302790][T12161] IPVS: ftp: loaded support on port[0] = 21 01:37:13 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e80)) [ 342.624691][T12171] JFS: Cannot determine volume size [ 342.630040][T12171] jfs: Unrecognized mount option "audit" or missing value 01:37:13 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 342.806467][T12181] FAULT_INJECTION: forcing a failure. [ 342.806467][T12181] name failslab, interval 1, probability 0, space 0, times 1 [ 342.824389][T12181] CPU: 1 PID: 12181 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 342.833176][T12181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.843302][T12181] Call Trace: [ 342.846691][T12181] dump_stack+0x1c9/0x220 [ 342.851131][T12181] should_fail+0x8b7/0x9e0 01:37:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000200)={0x9a0000, 0xe03ab61, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990afb, 0x5, [], @p_u16=&(0x7f0000000100)=0x8000}}) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0x300, 0x70bd28, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48010}, 0x4840) [ 342.855684][T12181] __should_failslab+0x1f6/0x290 [ 342.860725][T12181] should_failslab+0x29/0x70 [ 342.865436][T12181] kmem_cache_alloc_node+0xfd/0xed0 [ 342.871572][T12181] ? update_stack_state+0x9aa/0xab0 [ 342.877310][T12181] ? __alloc_skb+0x208/0xac0 [ 342.882300][T12181] __alloc_skb+0x208/0xac0 [ 342.886863][T12181] alloc_skb_with_frags+0x18c/0xa70 [ 342.892215][T12181] ? kmsan_get_metadata+0x11d/0x180 [ 342.897536][T12181] sock_alloc_send_pskb+0xada/0xc60 [ 342.903161][T12181] ? kmsan_get_metadata+0x4f/0x180 [ 342.908396][T12181] unix_dgram_sendmsg+0xc66/0x3ea0 [ 342.913689][T12181] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 342.919699][T12181] ? unix_dgram_poll+0xa80/0xa80 [ 342.924750][T12181] ____sys_sendmsg+0x12b6/0x1350 [ 342.929854][T12181] __sys_sendmmsg+0x808/0xc90 [ 342.934636][T12181] ? dump_task+0x7d8/0xce0 [ 342.939361][T12181] ? kmsan_get_metadata+0x11d/0x180 [ 342.944740][T12181] ? kmsan_get_metadata+0x11d/0x180 [ 342.950030][T12181] ? kmsan_set_origin_checked+0x95/0xf0 [ 342.955702][T12181] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 342.961972][T12181] ? kmsan_get_metadata+0x11d/0x180 [ 342.967275][T12181] ? kmsan_get_metadata+0x11d/0x180 [ 342.972596][T12181] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 342.978559][T12181] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 342.984740][T12181] ? prepare_exit_to_usermode+0x1ca/0x520 [ 342.990577][T12181] ? kmsan_get_metadata+0x4f/0x180 [ 342.995799][T12181] ? kmsan_get_metadata+0x4f/0x180 [ 343.001060][T12181] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 343.007097][T12181] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 343.012942][T12181] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 343.019117][T12181] do_fast_syscall_32+0x3c7/0x6e0 [ 343.024283][T12181] entry_SYSENTER_compat+0x68/0x77 [ 343.029470][T12181] RIP: 0023:0xf7fd1d99 [ 343.033633][T12181] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 343.053319][T12181] RSP: 002b:00000000f5dcc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 343.061913][T12181] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 343.070237][T12181] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 343.078293][T12181] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 343.086335][T12181] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 343.094737][T12181] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 343.166205][T12183] JFS: Cannot determine volume size [ 343.171568][T12183] jfs: Unrecognized mount option "audit" or missing value 01:37:14 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 343.253475][T11861] tipc: TX() has been purged, node left! 01:37:14 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) 01:37:14 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) ioctl$sock_bt_cmtp_CMTPCONNADD(r8, 0x400443c8, &(0x7f0000000e40)={r9, 0x3ff}) [ 343.644216][T12193] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 343.651709][T12193] loop3: partition table partially beyond EOD, truncated [ 343.659673][T12193] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 343.668442][T12200] FAULT_INJECTION: forcing a failure. [ 343.668442][T12200] name failslab, interval 1, probability 0, space 0, times 0 [ 343.681839][T12200] CPU: 0 PID: 12200 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 343.690588][T12200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.700823][T12200] Call Trace: [ 343.704224][T12200] dump_stack+0x1c9/0x220 [ 343.708703][T12200] should_fail+0x8b7/0x9e0 [ 343.713262][T12200] __should_failslab+0x1f6/0x290 [ 343.718305][T12200] should_failslab+0x29/0x70 [ 343.722995][T12200] __kmalloc_node_track_caller+0x1c3/0x1200 [ 343.728990][T12200] ? kmem_cache_alloc_node+0x1b0/0xed0 [ 343.734559][T12200] ? update_stack_state+0x9aa/0xab0 [ 343.739869][T12200] ? alloc_skb_with_frags+0x18c/0xa70 [ 343.745367][T12200] ? alloc_skb_with_frags+0x18c/0xa70 [ 343.746452][T12193] loop3: p2 start 257770150 is beyond EOD, truncated [ 343.751707][T12200] __alloc_skb+0x2fd/0xac0 [ 343.751771][T12200] ? alloc_skb_with_frags+0x18c/0xa70 [ 343.751856][T12200] alloc_skb_with_frags+0x18c/0xa70 [ 343.773681][T12200] ? kmsan_get_metadata+0x11d/0x180 [ 343.779005][T12200] sock_alloc_send_pskb+0xada/0xc60 [ 343.784318][T12200] ? kmsan_get_metadata+0x4f/0x180 [ 343.789520][T12200] unix_dgram_sendmsg+0xc66/0x3ea0 [ 343.794725][T12200] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 343.800669][T12200] ? unix_dgram_poll+0xa80/0xa80 [ 343.805665][T12200] ____sys_sendmsg+0x12b6/0x1350 [ 343.810686][T12200] __sys_sendmmsg+0x808/0xc90 [ 343.815428][T12200] ? trace_event_raw_event_power_domain+0xb8/0x520 [ 343.822027][T12200] ? kmsan_get_metadata+0x11d/0x180 [ 343.827289][T12200] ? kmsan_get_metadata+0x11d/0x180 [ 343.832556][T12200] ? kmsan_set_origin_checked+0x95/0xf0 [ 343.839114][T12200] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 343.845248][T12200] ? kmsan_get_metadata+0x11d/0x180 [ 343.850509][T12200] ? kmsan_get_metadata+0x11d/0x180 [ 343.855775][T12200] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 343.861647][T12200] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 343.867871][T12200] ? prepare_exit_to_usermode+0x1ca/0x520 [ 343.873674][T12200] ? kmsan_get_metadata+0x4f/0x180 [ 343.878849][T12200] ? kmsan_get_metadata+0x4f/0x180 [ 343.884038][T12200] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 343.890105][T12200] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 343.898771][T12200] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 343.904552][T12200] do_fast_syscall_32+0x3c7/0x6e0 [ 343.909654][T12200] entry_SYSENTER_compat+0x68/0x77 [ 343.914800][T12200] RIP: 0023:0xf7fd1d99 [ 343.918927][T12200] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 343.938582][T12200] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 343.947051][T12200] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 343.955067][T12200] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 343.963082][T12200] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 343.971362][T12200] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 343.979382][T12200] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 344.054719][T12202] JFS: Cannot determine volume size [ 344.060187][T12202] jfs: Unrecognized mount option "audit" or missing value 01:37:15 executing program 0 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 344.361373][T12197] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 344.368965][T12197] loop3: partition table partially beyond EOD, truncated [ 344.377042][T12197] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 344.414514][T12216] FAULT_INJECTION: forcing a failure. [ 344.414514][T12216] name failslab, interval 1, probability 0, space 0, times 0 [ 344.427782][T12216] CPU: 0 PID: 12216 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 344.436620][T12216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.446743][T12216] Call Trace: [ 344.450146][T12216] dump_stack+0x1c9/0x220 [ 344.454585][T12216] should_fail+0x8b7/0x9e0 [ 344.459127][T12216] __should_failslab+0x1f6/0x290 [ 344.464324][T12216] should_failslab+0x29/0x70 [ 344.469034][T12216] kmem_cache_alloc_node+0xfd/0xed0 [ 344.474445][T12216] ? kmsan_get_metadata+0x4f/0x180 [ 344.479662][T12216] ? __alloc_skb+0x208/0xac0 [ 344.484388][T12216] __alloc_skb+0x208/0xac0 [ 344.489151][T12216] alloc_skb_with_frags+0x18c/0xa70 [ 344.494529][T12216] ? kmsan_get_metadata+0x11d/0x180 [ 344.499858][T12216] sock_alloc_send_pskb+0xada/0xc60 [ 344.505199][T12216] ? kmsan_get_metadata+0x4f/0x180 [ 344.510421][T12216] unix_dgram_sendmsg+0xc66/0x3ea0 [ 344.512609][T12197] loop3: p2 start 257770150 is beyond EOD, truncated [ 344.515684][T12216] ? unix_dgram_poll+0xa80/0xa80 [ 344.527425][T12216] ____sys_sendmsg+0x12b6/0x1350 [ 344.532537][T12216] __sys_sendmmsg+0x808/0xc90 [ 344.537350][T12216] ? kobj_unmap+0x338/0x5c0 [ 344.542124][T12216] ? kmsan_get_metadata+0x11d/0x180 [ 344.547921][T12216] ? kmsan_set_origin_checked+0x95/0xf0 [ 344.553591][T12216] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 344.559767][T12216] ? __fpregs_load_activate+0x38c/0x3c0 01:37:15 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) [ 344.565424][T12216] ? kmsan_get_metadata+0x11d/0x180 [ 344.570734][T12216] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 344.576676][T12216] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 344.582989][T12216] ? prepare_exit_to_usermode+0x1ca/0x520 [ 344.588917][T12216] ? kmsan_get_metadata+0x4f/0x180 [ 344.591144][T12213] JFS: Cannot determine volume size [ 344.594166][T12216] ? kmsan_get_metadata+0x4f/0x180 [ 344.594233][T12216] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 344.594390][T12216] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 344.599673][T12213] jfs: Unrecognized mount option "audit" or missing value [ 344.604876][T12216] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 344.604937][T12216] do_fast_syscall_32+0x3c7/0x6e0 [ 344.605022][T12216] entry_SYSENTER_compat+0x68/0x77 [ 344.605054][T12216] RIP: 0023:0xf7fd1d99 [ 344.605139][T12216] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 344.663818][T12216] RSP: 002b:00000000f5dcc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 344.672473][T12216] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 344.680508][T12216] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 344.688539][T12216] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 344.696565][T12216] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 344.704758][T12216] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 01:37:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000200)={0x9a0000, 0xe03ab61, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990afb, 0x5, [], @p_u16=&(0x7f0000000100)=0x8000}}) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0x300, 0x70bd28, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48010}, 0x4840) 01:37:15 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000dc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e00)=0x10, 0x80000) [ 345.096584][T12222] JFS: Cannot determine volume size [ 345.102108][T12222] jfs: Unrecognized mount option "audit" or missing value 01:37:16 executing program 0 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 345.199415][T12228] JFS: Cannot determine volume size [ 345.205285][T12228] jfs: Unrecognized mount option "audit" or missing value 01:37:16 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) [ 345.353097][T12236] FAULT_INJECTION: forcing a failure. [ 345.353097][T12236] name failslab, interval 1, probability 0, space 0, times 0 [ 345.366395][T12236] CPU: 0 PID: 12236 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 345.375506][T12236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.385639][T12236] Call Trace: [ 345.389026][T12236] dump_stack+0x1c9/0x220 [ 345.393482][T12236] should_fail+0x8b7/0x9e0 [ 345.398040][T12236] __should_failslab+0x1f6/0x290 [ 345.403074][T12236] should_failslab+0x29/0x70 [ 345.407944][T12236] __kmalloc_node_track_caller+0x1c3/0x1200 [ 345.413928][T12236] ? kmem_cache_alloc_node+0x1b0/0xed0 [ 345.419492][T12236] ? alloc_skb_with_frags+0x18c/0xa70 [ 345.425258][T12236] ? alloc_skb_with_frags+0x18c/0xa70 [ 345.431182][T12236] __alloc_skb+0x2fd/0xac0 [ 345.435698][T12236] ? alloc_skb_with_frags+0x18c/0xa70 [ 345.441217][T12236] alloc_skb_with_frags+0x18c/0xa70 [ 345.446547][T12236] ? kmsan_get_metadata+0x11d/0x180 01:37:16 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x151800, 0x0) [ 345.451955][T12236] sock_alloc_send_pskb+0xada/0xc60 [ 345.457287][T12236] ? kmsan_get_metadata+0x4f/0x180 [ 345.462678][T12236] unix_dgram_sendmsg+0xc66/0x3ea0 [ 345.467987][T12236] ? unix_dgram_poll+0xa80/0xa80 [ 345.475803][T12236] ____sys_sendmsg+0x12b6/0x1350 [ 345.480880][T12236] __sys_sendmmsg+0x808/0xc90 [ 345.485679][T12236] ? sctp_setsockopt+0x6098/0x18aa0 [ 345.491041][T12236] ? kmsan_get_metadata+0x11d/0x180 [ 345.496342][T12236] ? kmsan_get_metadata+0x11d/0x180 [ 345.501654][T12236] ? kmsan_set_origin_checked+0x95/0xf0 [ 345.507341][T12236] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 345.513535][T12236] ? kmsan_get_metadata+0x11d/0x180 [ 345.519838][T12236] ? kmsan_get_metadata+0x11d/0x180 [ 345.525165][T12236] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 345.531087][T12236] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 345.537269][T12236] ? prepare_exit_to_usermode+0x1ca/0x520 [ 345.543107][T12236] ? kmsan_get_metadata+0x4f/0x180 [ 345.548523][T12236] ? kmsan_get_metadata+0x4f/0x180 [ 345.553762][T12236] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 345.559712][T12236] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 345.565564][T12236] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 345.571548][T12236] do_fast_syscall_32+0x3c7/0x6e0 [ 345.576724][T12236] entry_SYSENTER_compat+0x68/0x77 [ 345.581921][T12236] RIP: 0023:0xf7fd1d99 [ 345.586097][T12236] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 345.605875][T12236] RSP: 002b:00000000f5dcc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 345.614380][T12236] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 345.622423][T12236] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 345.630473][T12236] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 345.638521][T12236] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 345.646580][T12236] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 345.684789][T12226] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 345.693660][T12226] loop3: partition table partially beyond EOD, truncated [ 345.701351][T12226] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 345.793050][T12226] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:16 executing program 0 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 346.055960][T12246] JFS: Cannot determine volume size [ 346.061300][T12246] jfs: Unrecognized mount option "audit" or missing value [ 346.139811][T12244] JFS: Cannot determine volume size [ 346.146741][T12244] jfs: Unrecognized mount option "audit" or missing value [ 346.177764][T12253] FAULT_INJECTION: forcing a failure. 01:37:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000200)={0x9a0000, 0xe03ab61, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990afb, 0x5, [], @p_u16=&(0x7f0000000100)=0x8000}}) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0x300, 0x70bd28, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48010}, 0x4840) [ 346.177764][T12253] name failslab, interval 1, probability 0, space 0, times 0 [ 346.190654][T12253] CPU: 0 PID: 12253 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 346.199494][T12253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.209874][T12253] Call Trace: [ 346.213284][T12253] dump_stack+0x1c9/0x220 [ 346.217691][T12253] should_fail+0x8b7/0x9e0 [ 346.222362][T12253] __should_failslab+0x1f6/0x290 [ 346.227395][T12253] should_failslab+0x29/0x70 [ 346.232059][T12253] kmem_cache_alloc+0xd0/0xd70 [ 346.237174][T12253] ? getname_kernel+0xad/0x580 [ 346.242002][T12253] ? kmsan_get_metadata+0x4f/0x180 [ 346.247187][T12253] ? kmsan_get_metadata+0x11d/0x180 [ 346.252569][T12253] getname_kernel+0xad/0x580 [ 346.257428][T12253] ? kmsan_internal_set_origin+0x75/0xb0 [ 346.263128][T12253] kern_path+0x6d/0xe0 [ 346.267270][T12253] unix_find_other+0x151/0xda0 [ 346.272173][T12253] unix_dgram_sendmsg+0x1962/0x3ea0 [ 346.277510][T12253] ? unix_dgram_poll+0xa80/0xa80 [ 346.282639][T12253] ____sys_sendmsg+0x12b6/0x1350 [ 346.287701][T12253] __sys_sendmmsg+0x808/0xc90 [ 346.292467][T12253] ? vmw_cmd_dx_set_shader+0x5d8/0xa20 [ 346.298102][T12253] ? kmsan_get_metadata+0x11d/0x180 [ 346.303363][T12253] ? kmsan_get_metadata+0x11d/0x180 [ 346.308621][T12253] ? kmsan_set_origin_checked+0x95/0xf0 [ 346.314241][T12253] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 346.320378][T12253] ? kmsan_get_metadata+0x11d/0x180 [ 346.325638][T12253] ? kmsan_get_metadata+0x11d/0x180 [ 346.330920][T12253] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 346.336799][T12253] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 346.342938][T12253] ? prepare_exit_to_usermode+0x1ca/0x520 [ 346.348733][T12253] ? kmsan_get_metadata+0x4f/0x180 [ 346.353967][T12253] ? kmsan_get_metadata+0x4f/0x180 [ 346.359252][T12253] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 346.365159][T12253] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 346.371045][T12253] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 346.377360][T12253] do_fast_syscall_32+0x3c7/0x6e0 [ 346.382562][T12253] entry_SYSENTER_compat+0x68/0x77 [ 346.387707][T12253] RIP: 0023:0xf7fd1d99 [ 346.391928][T12253] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 346.411688][T12253] RSP: 002b:00000000f5dcc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 [ 346.420551][T12253] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 346.428769][T12253] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 346.437678][T12253] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 346.445718][T12253] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 346.453742][T12253] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 01:37:17 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) 01:37:17 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000d40)={@remote, r7}, 0x14) [ 346.795944][T12260] JFS: Cannot determine volume size [ 346.801279][T12260] jfs: Unrecognized mount option "audit" or missing value [ 346.865976][T12264] JFS: Cannot determine volume size [ 346.871410][T12264] jfs: Unrecognized mount option "audit" or missing value 01:37:18 executing program 0 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 347.096407][T12265] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 347.104137][T12265] loop3: partition table partially beyond EOD, truncated [ 347.111757][T12265] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 347.118243][T12276] FAULT_INJECTION: forcing a failure. [ 347.118243][T12276] name failslab, interval 1, probability 0, space 0, times 0 [ 347.132450][T12276] CPU: 0 PID: 12276 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 347.141188][T12276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.152647][T12276] Call Trace: [ 347.156038][T12276] dump_stack+0x1c9/0x220 [ 347.160563][T12276] should_fail+0x8b7/0x9e0 [ 347.165119][T12276] __should_failslab+0x1f6/0x290 [ 347.170165][T12276] should_failslab+0x29/0x70 [ 347.174842][T12276] kmem_cache_alloc+0xd0/0xd70 [ 347.179710][T12276] ? __d_alloc+0x8e/0xc30 [ 347.184152][T12276] ? kmsan_memcpy_memmove_metadata+0x10c/0x2e0 [ 347.190425][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.195737][T12276] __d_alloc+0x8e/0xc30 [ 347.199999][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.205543][T12276] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.211807][T12276] d_alloc_parallel+0x135/0x21c0 [ 347.217397][T12276] ? unlazy_walk+0x6c3/0x950 [ 347.222079][T12276] ? kmsan_internal_set_origin+0x75/0xb0 [ 347.227774][T12276] ? __msan_poison_alloca+0xf0/0x120 [ 347.233119][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.238391][T12276] __lookup_slow+0x191/0x720 [ 347.243080][T12276] ? down_read+0xe5/0x290 [ 347.247483][T12276] walk_component+0x355/0x950 [ 347.252319][T12276] path_lookupat+0x339/0xb30 [ 347.256967][T12276] ? __msan_poison_alloca+0xf0/0x120 [ 347.262350][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.267726][T12276] filename_lookup+0x328/0xbb0 [ 347.272699][T12276] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.279012][T12276] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.285144][T12276] ? getname_kernel+0x429/0x580 [ 347.290184][T12276] kern_path+0xd1/0xe0 [ 347.294548][T12276] unix_find_other+0x151/0xda0 [ 347.299420][T12276] unix_dgram_sendmsg+0x1962/0x3ea0 [ 347.304889][T12276] ? unix_dgram_poll+0xa80/0xa80 [ 347.310022][T12276] ____sys_sendmsg+0x12b6/0x1350 [ 347.315054][T12276] __sys_sendmmsg+0x808/0xc90 [ 347.319813][T12276] ? perf_trace_rdev_disconnect+0x308/0x610 [ 347.325800][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.331142][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.336496][T12276] ? kmsan_set_origin_checked+0x95/0xf0 [ 347.342119][T12276] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 347.348258][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.353907][T12276] ? kmsan_get_metadata+0x11d/0x180 [ 347.359288][T12276] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.365178][T12276] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 347.371375][T12276] ? prepare_exit_to_usermode+0x1ca/0x520 [ 347.377203][T12276] ? kmsan_get_metadata+0x4f/0x180 [ 347.382377][T12276] ? kmsan_get_metadata+0x4f/0x180 [ 347.387574][T12276] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 347.393462][T12276] __ia32_compat_sys_sendmmsg+0x127/0x180 [ 347.399245][T12276] ? __x32_compat_sys_sendmsg+0x120/0x120 [ 347.405042][T12276] do_fast_syscall_32+0x3c7/0x6e0 [ 347.410151][T12276] entry_SYSENTER_compat+0x68/0x77 [ 347.415559][T12276] RIP: 0023:0xf7fd1d99 [ 347.419692][T12276] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 347.439379][T12276] RSP: 002b:00000000f5dcc0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000159 01:37:18 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) [ 347.447946][T12276] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020008600 [ 347.455981][T12276] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 347.464715][T12276] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 347.472749][T12276] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 347.480775][T12276] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 01:37:18 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe4) [ 347.502838][T12265] loop3: p2 start 257770150 is beyond EOD, truncated [ 347.510632][T11861] tipc: TX() has been purged, node left! 01:37:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000200)={0x9a0000, 0xe03ab61, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990afb, 0x5, [], @p_u16=&(0x7f0000000100)=0x8000}}) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0x300, 0x70bd28, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48010}, 0x4840) 01:37:18 executing program 0 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 347.755805][T12280] JFS: Cannot determine volume size [ 347.761141][T12280] jfs: Unrecognized mount option "audit" or missing value 01:37:19 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) 01:37:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x4c0100, 0x0) write$nbd(r0, &(0x7f0000000540)={0x67446698, 0x0, 0x4, 0x4, 0x3, "fed21321097efb48d462c22e9b638ea085f1d292a2f8b07c84a3a7e51fea35c91f6878b048a21457896eab28e117739a8a1ea138fed6adb09e749771a1b9db6b43e4a102f2db346d2c07cd0c3c6e2d5a894c2a36e4c11f0d10a852ea135593b4508e4991941e2d1dadd8ef94d2"}, 0x7d) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@security={'security\x00', 0xe, 0x4, 0x478, 0x0, 0x0, 0x2c4, 0x1f8, 0x0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f00000005c0), {[{{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@inet=@udp={{0x2c, 'udp\x00'}, {[0x4e21, 0x4e20], [0x4e24, 0x4e20]}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x2, 'system_u:object_r:dhcpd_state_t:s0\x00'}}}, {{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x4, 0x8}}}, {{@uncond, 0x0, 0xa4, 0xec}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7f, 'syz1\x00', {0x9775}}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4d4) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x1, 0x4) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000b40)={0x2, {0x7, 0x5, 0x616, 0xffffffff}, {0x0, 0x7, 0x7fffffff, 0x1}, {0x412, 0xfffffff8}}) write$binfmt_aout(r0, &(0x7f0000000b80)={{0x0, 0xff, 0x8, 0x2af, 0x17f, 0x3, 0x2a7, 0x6}, "7572d9235ed4fa11203bb19387daffcc54d2ac1754e21e1d9a76ca", [[], [], [], [], [], [], [], [], []]}, 0x93b) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/zero\x00', 0x20100, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4008641a, &(0x7f0000001540)={0x7, &(0x7f0000001500)=[0x4, 0x5, 0x4, 0xfffffeff, 0x20, 0x2, 0x1]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000001580)='/dev/full\x00', 0x20002, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f00000015c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000001600)={{0x3a, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x4, 'dh\x00', 0x1f, 0x7, 0x3f}, {@multicast2, 0x4e21, 0x1, 0xfffffffd, 0xe23, 0x3}}, 0x44) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001680)='/dev/dlm_plock\x00', 0x20242, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000016c0)={0x0, 0x80000, r3}) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001700)='/proc/capi/capi20ncci\x00', 0x101040, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000001740)={r6, 0x80000, r7}) r8 = add_key$keyring(&(0x7f0000001800)='keyring\x00', &(0x7f0000001840)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000001780)='logon\x00', &(0x7f00000017c0)={'syz', 0x0}, 0x0, 0x0, r8) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0445611, &(0x7f0000001880)={0x2, 0x8, 0x4, 0x0, 0x40, {}, {0x2, 0x1, 0x3, 0x6, 0xe7, 0x2, "0fb18966"}, 0xa40, 0x1, @offset=0x4, 0x5, 0x0, 0xffffffffffffffff}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001940)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r9, &(0x7f0000001ac0)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001980)={0x100, r10, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4320e0af}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xd19}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5dd9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc421}]}, 0x100}, 0x1, 0x0, 0x0, 0x4}, 0x0) r11 = dup2(0xffffffffffffffff, r2) ioctl$KVM_SET_FPU(r11, 0x41a0ae8d, &(0x7f0000001b00)={[], 0x1, 0x7ff, 0x5, 0x0, 0x8, 0x107002, 0x4000, [], 0x5}) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001cc0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_mreqn(r12, 0x0, 0x23, &(0x7f0000001d00)={@remote, @broadcast}, &(0x7f0000001d40)=0xc) r13 = syz_open_dev$loop(&(0x7f0000001d80)='/dev/loop#\x00', 0x7fffffff, 0x200200) dup(r13) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/dlm_plock\x00', 0x519001, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000001e00)={0x0, 0x2}, &(0x7f0000001e40)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r14, 0x84, 0x76, &(0x7f0000001e80)={r15, 0x3}, 0x8) 01:37:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)) [ 348.374646][T12290] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 348.383056][T12290] loop3: partition table partially beyond EOD, truncated [ 348.390809][T12290] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 348.419063][T12290] loop3: p2 start 257770150 is beyond EOD, truncated [ 348.430601][T12294] JFS: Cannot determine volume size [ 348.436815][T12294] jfs: Unrecognized mount option "audit" or missing value [ 348.734372][T12304] JFS: Cannot determine volume size [ 348.740118][T12304] jfs: Unrecognized mount option "audit" or missing value [ 348.754758][ T32] audit: type=1400 audit(1583804239.807:60): avc: denied { write } for pid=12305 comm="syz-executor.0" name="attr" dev="proc" ino=32526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 01:37:19 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) [ 348.782367][ T32] audit: type=1400 audit(1583804239.807:61): avc: denied { add_name } for pid=12305 comm="syz-executor.0" name="bus" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 348.806802][ T32] audit: type=1400 audit(1583804239.807:62): avc: denied { create } for pid=12305 comm="syz-executor.0" name="bus" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 01:37:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0185647, &(0x7f0000000200)={0x9a0000, 0xe03ab61, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x990afb, 0x5, [], @p_u16=&(0x7f0000000100)=0x8000}}) 01:37:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:20 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x300, 0x0) [ 349.293306][T12320] JFS: Cannot determine volume size [ 349.298817][T12320] jfs: Unrecognized mount option "audit" or missing value 01:37:20 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) [ 349.429589][T12319] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 349.437236][T12319] loop3: partition table partially beyond EOD, truncated [ 349.445314][T12319] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 349.621486][T12319] loop3: p2 start 257770150 is beyond EOD, truncated [ 349.718535][T12338] JFS: Cannot determine volume size [ 349.724533][T12338] jfs: Unrecognized mount option "audit" or missing value [ 349.729106][T12333] JFS: Cannot determine volume size [ 349.737330][T12333] jfs: Unrecognized mount option "audit" or missing value 01:37:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r2 = pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, r2) 01:37:21 executing program 0: ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000000)=0x81) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000021c0)={@loopback, @empty, 0x0}, &(0x7f0000002200)=0xc) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r4, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000100)={0x9, [0x401, 0xfa], 0x3}, 0x10) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000080)={0x89, @loopback, 0x4e21, 0x0, 'ovf\x00', 0x2, 0x7, 0x1}, 0x2c) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000002240)={'batadv0\x00', r3}) 01:37:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) [ 350.108915][T12344] IPVS: ftp: loaded support on port[0] = 21 01:37:21 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000a40)={@fixed={[], 0x10}, 0x77, 0x0, 0x6, 0x9, 0x5, "f7500d19fa05336d107881763c006dbe055154dbf4c3a650853fbe4f34640e5bfe26f076abce7c2bc4dec4c983af1eac9f334ca1a9984ba27b09287b268271261b77281ba4544e570c8b4e84d271dc13e40878b6715fe2a4d736678977b89fec39713e5003d4ba698849f863439c4fdec02215309f81c228e5f44241a30982dd"}) [ 350.314122][T12348] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 350.321420][T12348] loop3: partition table partially beyond EOD, truncated [ 350.329503][T12348] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 350.364808][T12357] JFS: Cannot determine volume size [ 350.370175][T12357] jfs: Unrecognized mount option "audit" or missing value [ 350.379358][T12348] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 350.810659][T12344] chnl_net:caif_netlink_parms(): no params data found [ 350.815409][T12368] JFS: Cannot determine volume size [ 350.824765][T12368] jfs: Unrecognized mount option "audit" or missing value [ 350.923727][T12371] JFS: Cannot determine volume size [ 350.929154][T12371] jfs: Unrecognized mount option "audit" or missing value [ 351.553515][T12344] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.560775][T12344] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.570544][T12344] device bridge_slave_0 entered promiscuous mode [ 351.610179][T12344] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.617815][T12344] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.629216][T12344] device bridge_slave_1 entered promiscuous mode [ 351.745559][T12344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.804201][T12344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.908505][T12344] team0: Port device team_slave_0 added [ 351.924771][T12344] team0: Port device team_slave_1 added [ 352.007992][T12344] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 352.015241][T12344] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 352.041391][T12344] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 352.118631][T12344] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 352.125936][T12344] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 352.152059][T12344] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 352.312070][T12344] device hsr_slave_0 entered promiscuous mode [ 352.523051][T12344] device hsr_slave_1 entered promiscuous mode [ 352.742120][T12344] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 352.749766][T12344] Cannot create hsr debugfs directory [ 353.046301][T12344] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 353.109910][T12344] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 353.197942][T12344] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 353.304814][T12344] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 353.825246][T12344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.868497][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.877778][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.902950][T12344] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.929511][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.940226][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.949670][ T3369] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.957058][ T3369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.970149][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.992470][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.001707][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.011069][T11694] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.018264][T11694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.062848][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.073330][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.115062][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.125277][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.153671][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.163379][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.174194][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.223716][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.233873][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.243670][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.254069][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.274432][T12344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 354.359952][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 354.368090][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 354.413629][T12344] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.638491][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 354.649416][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.735626][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 354.745446][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.760682][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.772553][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.793158][T12344] device veth0_vlan entered promiscuous mode [ 354.850949][T12344] device veth1_vlan entered promiscuous mode [ 354.961315][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.971443][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.993237][T12344] device veth0_macvtap entered promiscuous mode [ 355.031264][T12344] device veth1_macvtap entered promiscuous mode [ 355.100555][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 355.112453][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.122495][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 355.133701][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.143765][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 355.154337][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.164310][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 355.174850][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.188733][T12344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 355.205363][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 355.214934][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 355.224438][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 355.234628][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.303683][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 355.314270][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.324537][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 355.335082][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.345145][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 355.355691][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.365819][T12344] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 355.376553][T12344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 355.391010][T12344] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 355.400240][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.411550][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 356.396719][T12424] IPVS: set_ctl: invalid protocol: 58 172.30.1.5:20004 [ 356.428199][T12425] IPVS: set_ctl: invalid protocol: 58 172.30.1.5:20004 01:37:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)) 01:37:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) pkey_alloc(0x0, 0x2) fsetxattr$security_ima(r1, &(0x7f0000000340)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "a22cc1eeebd9da87ab"}, 0xa, 0x2) 01:37:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="9b"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000000)={0x1, "35471366f4b5407d5657265086c008399bce144c9262be909017b44cf3e91ce7", 0x4, 0x80, 0x1ff, 0x3, 0x1, 0x2, 0x9, 0xffff}) 01:37:27 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 01:37:27 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) [ 356.726555][T12435] JFS: Cannot determine volume size [ 356.732817][T12435] jfs: Unrecognized mount option "audit" or missing value [ 356.787080][T12433] JFS: Cannot determine volume size [ 356.792568][T12433] jfs: Unrecognized mount option "audit" or missing value [ 356.805659][T12431] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 356.813971][T12431] loop3: partition table partially beyond EOD, truncated [ 356.821605][T12431] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 356.899826][T12431] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000100)=0x8001) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 01:37:28 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) 01:37:28 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) 01:37:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)) 01:37:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="992c8d4232d9b614ada07fa21c3b253cba17d6250e2d63685add51f8446c5491f0d14587d1e99c407265a7c05380b02ea91e12e490217497defb01dbd8491924300180c8494fbf4d300a166a7da0e73224ef663e414e058e6b5ff9cc949d628d453dc8347b12ceefb431a99be4ba975a74a5d1271bb074b108f2d308c8f92d149d4641455cfa4107ec2f806d86e482ffcc853c46467af9c88e69e0560d010af3baf2c42b6f0a603fb8eba1f5556ddd34220ebfd9e3773264db26d495c94e393611300b6b4cc0690862054fd497be3af29cd2b905cb7e65bdd71102421fea64892ed53bb8249b8dee83d379f8fceeb766e104afdf6c32e430dd443b5c36a98ecf51eeac04144a3a38041530e6066cd287b7f511334c3a8b133a987e2236f892df08f936c175583deca23e32e8cd2a84608db4c45a2015bf293111e261e6b3786c5926dc1bcc2fd30ef5c72539f8f911106ad23c62d89d48f75eb379a3c3bcf8b3d67efce65eceeca9c078121fdd64f35c71f3f319357546fa939ddb776db7a8cf7547611ee6531a1093e4c95c872b66a899b7fa9674c1fcbf06488d78d3258ed5d14ffdef01b41e55e290ff38fecdfe9269e098b221e1c0c7ff04fd4401a58f824584415dfed0c8c5bdd5ee5199973bcd5588c5c70ca43c53d0547372a03cdc5c7f28a376ccad213f95cbbe2e59b7358b6e4526c0b29d019d2b0f2106e0463c99d0ac20a2310d7667f5e32ec9a5e9191dcf1135ae17f07cfff12d09fdf1f964f1622b42265f2db2a3165d0fcb3fa6994bc59dfab2498fb1084bd3a7d701f32c16e8d71cecd63c19b05ec9177553780310a18d545ef9ef170bddb5290977eb02ab3df7146f3c8fb2f597de5596dfe9f8b2caaca30a13c23746871271568b32f6e42eb77ac402d2b5b85f3b5d2ff71de651ee872bf23f5bebf90b94c0a1a6a15096a9197f43e5340f2dc91db30a19ba57b3c5378d3f3d074289b5db5c93d6615a43cf321513c4efd174f8a9a0e1fe9800032817ab5c0d7281d0b890ddb74bc7abd81496cd22c14dac298350c2f956233ba9e1bc6feaf1c675afa97622cb3063abef7e327095ca12ddb988cd057774bd7b5ea88f86041a6372528dc979f817de202a4dda7c826e80f9de054002a0bb2cec00c41c310da4c5ea89b4199f2fb6a32fc82100551f4dd77d35dcc5cba3c5b85a0e1b97b6881ebb6df6f599264d1ee24755ff4e9169a833281b200e9b2f764972b9a04f2b61a9c7a2ec8e15018b8f72c900ac016d186350aed985bafa3f8010928398f2129bdac1fbe7c9429d43e2708a4078cba3f721126ae1c030ceb99ab7b1ba68e67c57e02e2c6de043c177c6116e2e31c11dec0e2ab10302c7fb3af8cabecc36c24b4b890aea6511d4200d99a667754a893592b0288214b581ec65e2b16f44900e2c42e3be0db37110c9951fe5f90df8dfab719e0f1c5840a8ae21982ff515d017e591778ad9dcbe8611061c0340c0e3e9ed84d4e2282f277c1b138f53ab75b213a18927abd4c93378b3a3dc97886c296792febbc60480557248f9e7eb2f9e0e48c007bc4f75a944fdcbabea01522aba3b3ae795952262da2363cb3737ff176735fca95925331949290b8d29da3bd5e5e2758a8e5c6bb9499de1403228be8e9ea7b4b7a81559faac2c91fc32ad277a5bb4dfe8d8f3725ab1e1b7f1bce6812ccdcc299ce7391e4796ea3a45a59d63efb27d56b9e69323c34c35d9a161bfc439dad4cc31ae45713915741e876deeaeec83b1874d1d3fc349a16e03182b80f856fd767c75ee9c218ea9752292063247195e10511277f2ebd6d0251be2507698bf45861ee878e099d2339d3c8482f373c547e62aa98149ffd2855e68109e1d0668d88e45faf755b2e1bf043367da3b2bbf0c7f3562d7d3d45719f57209c618406a28985283c43175aef6783d795c93dbadd17fde8b1a9a09fd764a753f696560faba413f544b07e7b02c531c7baa58614df1e4b76b295204385a4bcac6b915dbfff117ef1a5078e51fd3e9cd97e361f1df8ff3c6018f264a35c078cf57b58dbb4312113dfda345ea67f4d72fd6d3033b807a5f36d2d00f553f56321ab08f1856033eddde0081897fb1d94dc168132bbf713a48ed2f825d1ff6f310b39f97007246df954d610f19268d8c3fb2e689b6c070", 0x600, 0x800}]) pkey_alloc(0x0, 0x2) 01:37:28 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x56, 0x40401) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0186415, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x8, 0x5, 0x8, &(0x7f0000ffc000/0x4000)=nil}) sendfile(r0, r0, &(0x7f0000000080)=0x6, 0x3) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x9, 0x2, 0xff}, {0x1, 0xd8, 0x8, 0x3}, {0xff, 0x0, 0x4, 0x8}, {0x7fff, 0xb4, 0x9, 0x3ff}, {0x9, 0x4, 0x9, 0x7f}]}) r1 = socket(0x1f, 0xa, 0x40) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000240)=0x80) recvmsg(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000340)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001600)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/62, 0x3e}, {&(0x7f0000001400)=""/12, 0xc}, {&(0x7f0000001440)=""/80, 0x50}, {&(0x7f00000014c0)=""/243, 0xf3}, {&(0x7f00000015c0)=""/23, 0x17}], 0x6, &(0x7f0000001640)}, 0x40) recvmmsg(0xffffffffffffffff, &(0x7f0000004a80)=[{{&(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001740)=""/176, 0xb0}, {&(0x7f0000001800)=""/155, 0x9b}, {&(0x7f00000018c0)=""/196, 0xc4}], 0x3}}, {{&(0x7f0000001a00)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001a80)=""/143, 0x8f}, {&(0x7f0000001b40)=""/219, 0xdb}, {&(0x7f0000001c40)=""/19, 0x13}, {&(0x7f0000001c80)=""/247, 0xf7}, {&(0x7f0000001d80)=""/92, 0x5c}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/123, 0x7b}, {&(0x7f0000002e80)=""/46, 0x2e}], 0x8}, 0xfa9}, {{&(0x7f0000002f00)=@nfc, 0x80, &(0x7f0000004180)=[{&(0x7f0000002f80)=""/225, 0xe1}, {&(0x7f0000003080)=""/197, 0xc5}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x3, &(0x7f00000041c0)=""/24, 0x18}, 0x8}, {{&(0x7f0000004200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004280)=""/140, 0x8c}, {&(0x7f0000004340)=""/68, 0x44}, {&(0x7f00000043c0)=""/37, 0x25}, {&(0x7f0000004400)=""/49, 0x31}, {&(0x7f0000004440)=""/125, 0x7d}], 0x5, &(0x7f0000004500)=""/195, 0xc3}, 0x200}, {{&(0x7f0000004600)=@can, 0x80, &(0x7f0000004880)=[{&(0x7f0000004680)=""/55, 0x37}, {&(0x7f00000046c0)=""/194, 0xc2}, {&(0x7f00000047c0)=""/154, 0x9a}], 0x3, &(0x7f00000048c0)=""/191, 0xbf}, 0x4}, {{0x0, 0x0, &(0x7f00000049c0)=[{&(0x7f0000004980)=""/33, 0x21}], 0x1, &(0x7f0000004a00)=""/68, 0x44}, 0x80}], 0x6, 0x40000001, &(0x7f0000004b40)={0x0, 0x989680}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004c40)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000004d40)=0xe4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004e40)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000004e80)={'wg0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005140)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000005240)=0xe4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005280)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005380)=0xe4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000053c0)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000054c0)=0xe4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000005500)={0x0, @multicast2, @initdev}, &(0x7f0000005540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005580)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000005680)=0xe4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000056c0)={'batadv_slave_1\x00', 0x0}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000005800)=0x0, &(0x7f0000005840)=0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005f00)={'ip6erspan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005f40)={'wg0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000005f80)={'wg0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000006580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000006540)={&(0x7f0000005fc0)={0x578, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x268, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x200, 0x20, 0x40, 0x3}, {0x8, 0x81, 0x1, 0x8}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r16}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x1f, 0x5, 0xf9, 0x663d6aac}, {0x6, 0x16, 0x0, 0xfffffff7}, {0x7, 0xfb, 0x40, 0x277f}, {0x8b63, 0xc7, 0x4, 0x81}, {0x6, 0x20, 0x5, 0xff}, {0xfec3, 0xa0, 0x7f, 0x400}, {0x8, 0x7, 0x80, 0x16a}]}}}]}}]}, 0x578}, 0x1, 0x0, 0x0, 0x400}, 0x40800) r19 = openat$vsock(0xffffffffffffff9c, &(0x7f00000065c0)='/dev/vsock\x00', 0x101400, 0x0) ioctl$VIDIOC_S_MODULATOR(r19, 0x40445637, &(0x7f0000006600)={0x1, "d09192412a5c43ad5bd0351f5482b8455b60d3cc83d17ca82b47203f41522170", 0x4, 0x7b7, 0x2e, 0x1, 0x1}) readlink(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)=""/163, 0xa3) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$VIDIOC_QUERYSTD(r20, 0x8008563f, &(0x7f0000006780)) ioctl$LOOP_CLR_FD(r19, 0x4c01) r21 = dup(0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r21, 0xc0184900, &(0x7f00000067c0)={0x8, 0x12}) [ 358.198629][T12470] JFS: Cannot determine volume size [ 358.204136][T12470] jfs: Unrecognized mount option "audit" or missing value [ 358.227707][T12472] JFS: Cannot determine volume size [ 358.234070][T12472] jfs: Unrecognized mount option "audit" or missing value [ 358.404533][T12474] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 358.412442][T12474] loop3: partition table partially beyond EOD, truncated [ 358.420178][T12474] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 358.432206][T12474] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:29 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x80085617, 0x0) 01:37:29 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)={r4}) 01:37:29 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9}) 01:37:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) [ 358.983589][T12493] JFS: Cannot determine volume size [ 358.988916][T12493] jfs: Unrecognized mount option "audit" or missing value [ 359.048603][T12496] JFS: Cannot determine volume size [ 359.054859][T12496] jfs: Unrecognized mount option "audit" or missing value [ 359.338036][T12504] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 359.345589][T12504] loop3: partition table partially beyond EOD, truncated [ 359.353932][T12504] loop3: p1 size 3238031214 extends beyond EOD, truncated 01:37:30 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) 01:37:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 359.503802][T12504] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:30 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9}) [ 359.670677][T12512] JFS: Cannot determine volume size [ 359.676591][T12512] jfs: Unrecognized mount option "audit" or missing value 01:37:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) [ 359.877348][T12518] IPVS: ftp: loaded support on port[0] = 21 [ 360.046405][T12523] JFS: Cannot determine volume size [ 360.051763][T12523] jfs: Unrecognized mount option "audit" or missing value 01:37:31 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 360.237776][T12527] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 360.245457][T12527] loop3: partition table partially beyond EOD, truncated [ 360.254984][T12527] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 360.375598][T12527] loop3: p2 start 257770150 is beyond EOD, truncated [ 360.437405][T12534] JFS: Cannot determine volume size [ 360.444078][T12534] jfs: Unrecognized mount option "audit" or missing value [ 360.892489][T12518] chnl_net:caif_netlink_parms(): no params data found [ 361.301549][T12518] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.309826][T12518] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.319623][T12518] device bridge_slave_0 entered promiscuous mode [ 361.384416][T12518] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.391760][T12518] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.433102][T12518] device bridge_slave_1 entered promiscuous mode [ 361.520593][T12518] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.548979][T12518] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.608182][T12518] team0: Port device team_slave_0 added [ 361.628081][T12518] team0: Port device team_slave_1 added [ 361.670332][T12518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 361.677849][T12518] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.704095][T12518] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 361.726963][T12518] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 361.735035][T12518] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.762208][T12518] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 361.867279][T12518] device hsr_slave_0 entered promiscuous mode [ 361.912771][T12518] device hsr_slave_1 entered promiscuous mode [ 361.952038][T12518] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 361.959747][T12518] Cannot create hsr debugfs directory [ 362.122552][T12518] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 362.169095][T12518] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 362.228909][T12518] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 362.288819][T12518] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 362.499699][T12518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.529129][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.538764][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.557562][T12518] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.576739][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.587048][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.596938][T11694] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.604236][T11694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.617849][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.634391][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.645641][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.656050][ T3369] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.663670][ T3369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.686706][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.716060][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.727217][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.738074][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.763599][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.774287][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.784757][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.806639][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.815965][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.841324][T12518] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 362.854211][T12518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.864781][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.874740][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.921300][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.929387][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.955012][T12518] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.071752][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.084649][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.128088][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.138551][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.158494][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.167544][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.179121][T12518] device veth0_vlan entered promiscuous mode [ 363.210479][T12518] device veth1_vlan entered promiscuous mode [ 363.266929][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 363.276551][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 363.285687][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.295250][ T3369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.318389][T12518] device veth0_macvtap entered promiscuous mode [ 363.336137][T12518] device veth1_macvtap entered promiscuous mode [ 363.376224][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.387477][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.397493][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.408355][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.418915][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.429580][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.440468][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.453775][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.464034][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.474600][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.488077][T12518] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 363.499745][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.508947][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.518057][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.527989][T11694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.553716][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.564698][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.575290][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.586713][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.597651][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.608953][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.619427][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.630298][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.640798][T12518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.652257][T12518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.665456][T12518] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 363.676743][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.687685][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:37:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9}) 01:37:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="992c8d4232d9b614ada07fa21c3b253cba17d6250e2d63685add51f8446c5491f0d14587d1e99c407265a7c05380b02ea91e12e490217497defb01dbd8491924300180c8494fbf4d300a166a7da0e73224ef663e414e058e6b5ff9cc949d628d453dc8347b12ceefb431a99be4ba975a74a5d1271bb074b108f2d308c8f92d149d4641455cfa4107ec2f806d86e482ffcc853c46467af9c88e69e0560d010af3baf2c42b6f0a603fb8eba1f5556ddd34220ebfd9e3773264db26d495c94e393611300b6b4cc0690862054fd497be3af29cd2b905cb7e65bdd71102421fea64892ed53bb8249b8dee83d379f8fceeb766e104afdf6c32e430dd443b5c36a98ecf51eeac04144a3a38041530e6066cd287b7f511334c3a8b133a987e2236f892df08f936c175583deca23e32e8cd2a84608db4c45a2015bf293111e261e6b3786c5926dc1bcc2fd30ef5c72539f8f911106ad23c62d89d48f75eb379a3c3bcf8b3d67efce65eceeca9c078121fdd64f35c71f3f319357546fa939ddb776db7a8cf7547611ee6531a1093e4c95c872b66a899b7fa9674c1fcbf06488d78d3258ed5d14ffdef01b41e55e290ff38fecdfe9269e098b221e1c0c7ff04fd4401a58f824584415dfed0c8c5bdd5ee5199973bcd5588c5c70ca43c53d0547372a03cdc5c7f28a376ccad213f95cbbe2e59b7358b6e4526c0b29d019d2b0f2106e0463c99d0ac20a2310d7667f5e32ec9a5e9191dcf1135ae17f07cfff12d09fdf1f964f1622b42265f2db2a3165d0fcb3fa6994bc59dfab2498fb1084bd3a7d701f32c16e8d71cecd63c19b05ec9177553780310a18d545ef9ef170bddb5290977eb02ab3df7146f3c8fb2f597de5596dfe9f8b2caaca30a13c23746871271568b32f6e42eb77ac402d2b5b85f3b5d2ff71de651ee872bf23f5bebf90b94c0a1a6a15096a9197f43e5340f2dc91db30a19ba57b3c5378d3f3d074289b5db5c93d6615a43cf321513c4efd174f8a9a0e1fe9800032817ab5c0d7281d0b890ddb74bc7abd81496cd22c14dac298350c2f956233ba9e1bc6feaf1c675afa97622cb3063abef7e327095ca12ddb988cd057774bd7b5ea88f86041a6372528dc979f817de202a4dda7c826e80f9de054002a0bb2cec00c41c310da4c5ea89b4199f2fb6a32fc82100551f4dd77d35dcc5cba3c5b85a0e1b97b6881ebb6df6f599264d1ee24755ff4e9169a833281b200e9b2f764972b9a04f2b61a9c7a2ec8e15018b8f72c900ac016d186350aed985bafa3f8010928398f2129bdac1fbe7c9429d43e2708a4078cba3f721126ae1c030ceb99ab7b1ba68e67c57e02e2c6de043c177c6116e2e31c11dec0e2ab10302c7fb3af8cabecc36c24b4b890aea6511d4200d99a667754a893592b0288214b581ec65e2b16f44900e2c42e3be0db37110c9951fe5f90df8dfab719e0f1c5840a8ae21982ff515d017e591778ad9dcbe8611061c0340c0e3e9ed84d4e2282f277c1b138f53ab75b213a18927abd4c93378b3a3dc97886c296792febbc60480557248f9e7eb2f9e0e48c007bc4f75a944fdcbabea01522aba3b3ae795952262da2363cb3737ff176735fca95925331949290b8d29da3bd5e5e2758a8e5c6bb9499de1403228be8e9ea7b4b7a81559faac2c91fc32ad277a5bb4dfe8d8f3725ab1e1b7f1bce6812ccdcc299ce7391e4796ea3a45a59d63efb27d56b9e69323c34c35d9a161bfc439dad4cc31ae45713915741e876deeaeec83b1874d1d3fc349a16e03182b80f856fd767c75ee9c218ea9752292063247195e10511277f2ebd6d0251be2507698bf45861ee878e099d2339d3c8482f373c547e62aa98149ffd2855e68109e1d0668d88e45faf755b2e1bf043367da3b2bbf0c7f3562d7d3d45719f57209c618406a28985283c43175aef6783d795c93dbadd17fde8b1a9a09fd764a753f696560faba413f544b07e7b02c531c7baa58614df1e4b76b295204385a4bcac6b915dbfff117ef1a5078e51fd3e9cd97e361f1df8ff3c6018f264a35c078cf57b58dbb4312113dfda345ea67f4d72fd6d3033b807a5f36d2d00f553f56321ab08f1856033eddde0081897fb1d94dc168132bbf713a48ed2f825d1ff6f310b39f97007246df954d610f19268d8c3fb2e689b6c070", 0x600, 0x800}]) 01:37:35 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 364.160504][T12582] Unknown ioctl 1078220343 [ 364.168206][T12582] Unknown ioctl 19457 [ 364.187234][T12583] Unknown ioctl 19457 01:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0]}) write$P9_RREADDIR(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="626ae438d0dbdc8ef589da6f2036493b85bf97"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000240)={0x7f, 0x9, 0x3}) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="622807370428cb89d3662ba1d8f2324f1fb09886dfeb022f3b1a28c69cca"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r3, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000000)=""/107) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc044565d, &(0x7f0000000380)={0x2, 0xa, 0x4, 0xeff5894b6462e48d, 0x8001, {0x77359400}, {0x5, 0x0, 0x1, 0x3f, 0x3f, 0x81, "ddb82411"}, 0x0, 0x1, @userptr, 0x76a, 0x0, r4}) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000300)) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x3, 0x594, 0x1, 0x459d6010, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000200)={r6}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000480)) r8 = syz_open_procfs(r7, &(0x7f0000000040)='net/vlan/vlan0\x00') ioctl$DRM_IOCTL_AGP_ACQUIRE(r8, 0x6430) fchdir(r8) [ 364.415090][T12594] JFS: Cannot determine volume size [ 364.420418][T12594] jfs: Unrecognized mount option "audit" or missing value 01:37:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 364.487631][T12595] JFS: Cannot determine volume size [ 364.493504][T12595] jfs: Unrecognized mount option "audit" or missing value [ 364.506746][T12593] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 364.514289][T12593] loop3: partition table partially beyond EOD, truncated [ 364.522312][T12593] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 364.672568][T12593] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000980)={0x7, 0x2, 0x1f, 0x9}) 01:37:36 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="a957a6e39012a71c15a3cfcbd50273dc42e8be775f3bd235132f9ecdb9da0683036e665f78fe0db6957acac4558bcc1cfbae68f6132c0630ad8dc64d350339dd55f9caa205e57b02e996d49daaf9749e826995131992fe5d4d17ef352b22f56fbda132b305df13a7d46d7ebc4f7e951160b7"], 0x10, 0x1) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) set_mempolicy(0x4000, &(0x7f0000000040), 0xfffffffd) ioctl$int_out(r1, 0x5460, &(0x7f0000000000)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/107) pread64(r2, &(0x7f0000000180)=""/4096, 0x1000, 0xffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 365.302952][T12620] JFS: Cannot determine volume size [ 365.308296][T12620] jfs: Unrecognized mount option "audit" or missing value [ 365.370442][T12623] JFS: Cannot determine volume size [ 365.376475][T12623] jfs: Unrecognized mount option "audit" or missing value 01:37:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>', r3}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) [ 365.664741][T12634] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 365.672429][T12634] loop3: partition table partially beyond EOD, truncated [ 365.680046][T12634] loop3: p1 size 3238031214 extends beyond EOD, truncated 01:37:36 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 365.803295][T12644] JFS: Cannot determine volume size [ 365.808628][T12644] jfs: Unrecognized mount option "audit" or missing value 01:37:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="9f27629b85564fbbda75c1e3c603791055c8fdb0d14532d6e85baca155", 0x1d}], 0x1, &(0x7f0000000600)}}], 0x2, 0x2) [ 365.877143][T12634] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000007c0)=0xe4) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<', r2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) [ 366.216553][T12652] JFS: Cannot determine volume size [ 366.222200][T12652] jfs: Unrecognized mount option "audit" or missing value 01:37:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/107) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:37 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000080)=0x8c) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000180)={0x5a0, 0x1, 'client1\x00', 0x4, "4e9a9821f75b9bc0", "b594bbd06476dfe61b52c4d1fe20443528d9155246e2a6a231ea1a73e151b157", 0x7ff, 0x1}) getcwd(&(0x7f0000000540)=""/136, 0x88) fchdir(r0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000240)=0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000008600), 0x808, 0x4048081) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000100)=0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000000c0)={@dev}, &(0x7f0000000280)=0x14) [ 366.508979][T12667] JFS: Cannot determine volume size [ 366.514657][T12667] jfs: Unrecognized mount option "audit" or missing value 01:37:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:37 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 366.699468][T12672] JFS: Cannot determine volume size [ 366.705088][T12672] jfs: Unrecognized mount option "audit" or missing value 01:37:38 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:38 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 366.998996][T12678] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 367.006767][T12678] loop3: partition table partially beyond EOD, truncated [ 367.014622][T12678] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 367.066903][T12678] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a30b06477828409de8480f6987541459ca136c85c4a72c191a1238f4ab8693f90e27342a82e2a5683909165af9993a27a9fa5efd85022e0723d166cc089bc8b0b389410ce933358b0eb64c68e58bc5c32251db090ca723d7b9116b7d3d770"], 0x61) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:38 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 367.427457][T12700] JFS: Cannot determine volume size [ 367.433030][T12700] jfs: Unrecognized mount option "audit" or missing value [ 367.546681][T12704] JFS: Cannot determine volume size [ 367.552303][T12704] jfs: Unrecognized mount option "audit" or missing value 01:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)="e303e0cae29b88d54e9f894b2c7bca130b402aa81ac3415987b58b4307ef39", 0x1f}, {&(0x7f0000000040)="a279722678db55e9097822334f2bb0bdc2da419c537826b195542a2d6c9550ea732c9fb130148385ce18a58400ae93869a5c521aafd14c7cae9f32", 0x3b}, {&(0x7f0000000180)="542d5b3cb2a948bc02dbf5a3e933760e6754bab2f4a8db26241fb3f4a784abcf740a9e46e4cb9c10a481e84e056e7090cba9490dae60e21ce074c714411aca68579de0b211662bf6bac82a8a06d5f3219938513cbda8947a94956aefdcb0ef7bd65f36e00a6a7b0426094d4c997fdfd55b59849e275e5a2acfbeebff39721f532e7fc53cf47b9ec2f4740f6d25c46b111ce1b1287156bb3563fc36fcf110cfb0b7780c941c4c4194c2ec4371ddc4fb9483c732595ae77b2ff87bf028892ae0d6863339f1c395154ff9702ca232b53fa9a954f983a70971fc439338ab5027e88294dbde900f0a03aa0858", 0xea}, {&(0x7f0000000280)="15c63e7a9c6d64ac2992f7892107dac9f19d8ad56da0268649e0d4a0bf21af14de647e39232aee0aa44ac36837b57a82ccac155e93a6efc68355a34ed44bf2fc085746958b21e2c1f54b97d71dc6c518b85f412e7ab9187a67bf211c89b3880a0a28533a9ad9cdf6848ff38bf2c6c9c154b8d0474cadaf58d921a15764a7ec4794fdec4ae4c621e6ddc5ff4c4d17bc032affab330cbdfc20ac6739af4fb584757bb8bcf465482186673d306318045a268f04fbf390245a579bad3ec5f461e59584b24a4f5c68e5e53e2cb3d1d85903fb9a5007cc17d800ed8e402b1a5d417f80468612fca3e4cabb35d391e10f28ff7a516d4df5", 0xf4}, {&(0x7f0000000380)="af176198d3c5a8d59496b7efccdcaa26ac272476d7632802c87635aa425b664f0035fee197136d33559304a9ca0015bbeac7a367892c03299f4dfe95b9dc9c9d14837fa0ac71b0d8add2f75cd2216de88c1afc7c54e4297620699ea83008b8c194f10ace1ca6366c491967f2c8c8d70b322a380c9dca28e66415f47d8196d78b773f4092ce8195affd38631f2501fea158340046c00a594e71f36471f7e82aabec82ee6981359b1d2a73bacb54c5196b5d03c948ad7663f69e40e31059d4185988b25df7f88da20b2f1ab09e3344cde102ec1641d32fe33d9585ff89a9853d724f614353bd1e25f382db6fab6051b5005e48b90fea", 0xf5}, {&(0x7f0000000080)}, {&(0x7f0000000480)="b492c1e0d84559f7c705f07d4dc4e5628a2fa7b4f44b6a4dc59509c199e563466f67d971c673eebbe6631bd505c6c40bb87174b4c1377b64f75c883bf65d36698bdd04f1d85100169cd8b5ce35dfdff7a8e9b36044a6857fc333e51c000095548b37b1b27df390c504d56abe1e8ce7a719449e6c65ea26e994ef2480005de7a43d5f69ef5d5513fed8cbbf7a3dc4c8932ea1ac84e230c102a8", 0x99}, {&(0x7f0000000540)="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", 0xfc}], 0x8, &(0x7f0000000600)}}], 0x2, 0x0) [ 367.664821][T12713] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 367.672417][T12713] loop3: partition table partially beyond EOD, truncated [ 367.680069][T12713] loop3: p1 size 3238031214 extends beyond EOD, truncated 01:37:38 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 367.845866][T12713] loop3: p2 start 257770150 is beyond EOD, truncated 01:37:39 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xffffffff, &(0x7f0000000500)=0x4) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) [ 367.962961][T12720] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 367.975840][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 367.987395][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 367.996127][T12713] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 368.052353][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.064242][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.074247][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.085501][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.095400][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.106649][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.118633][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.129877][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.141830][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.153397][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.167277][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.178441][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.188477][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="14dd27ecfad9a94c4d60fe6ab83c03324a9f7a025e296c25e8ffe16409e253b50dfded6d73304d76d93b95533dd304c8f9816c47006b81ef1ee5739594367a5d3f3e003ed2959da70ea4240096f1630e04660fb4096e1bc585c73ff55bedbe112b727bdce6a17a6e24bce4f3812a370c2b1625e6c23864efdb50c674f86797ebfeea85bbdbeaada6fb3109855a75552256582f0182fd84bbccc004062ac0f1", 0x9f}, {&(0x7f0000000180)="c193ea47645cc7fe5be090dd2f98efa7f965e905401183be87644240e67563a88451f6900dee288515e0f85fc806184f678ec6c32c912319d99534860dce2333b37948775cf69a6c70e5320f8510a2b8", 0x50}, {&(0x7f0000000200)="0a77d9979160cca133ce2b430f40f2af95f4f1ed23bb87aa4ca29337c173f3bbb930afedf0eebe28d70da34915774a4cd3cbbb9c8f7f3602109e909956631c2f42dd5a9b6b324153f21b8b15266ea0b3a97bddf73d38fd704ee71115c4606821abf543be15418cfd0378f7d0954f835ff7dbb6ae8d48e752b3c45273bce1b9510b7a9f679f44e8c26a44c1cf896430230bd1c9a03dffe0ee5511815f050b68db8f698dc6265e3dcbdd931318c6c330b75c5d6266d2", 0xb5}, {&(0x7f00000002c0)="dd05bf060cce73b103582268efbf0bdad73fb38e35bdade7a81f8e2f2e32f2e3b19483386bb77d3978dd67a992d38ee0c3ece73c1db89927e057d2d0a2fc9fd2268ca8a6710f1c4ad223356ba99b4fa7c83799ea5d6ec7e5e87690761114494fb6ad8cb8aa25dbdae49aec9927a0fe24ded180b158188ffbfdc8e9f8e14f9aa2d878b9b30a41a1d096a7b5c4232104e91b09fa6632318a2cc856e46088021b6ca26c4975ed820289149df686c5f19548e5eefbee3cb05b42caf742a3bd80f9c80136c3974a", 0xc5}, {&(0x7f00000003c0)="cc1cc3b690f151c9a568d14f602a55e99f8254dafcf281bcc6323d433cd0649ba5faf0af13d2941668b250c05f44defe79367731eb26f52e2eec9779277bcc9ed321e32aa6c7545f84ee313281e9b4142b727cdf4ce3403611e36bcab31b7fe64b98fadff5a22b597b9d936ebd269268e71ed999b3182e0335e542406b1e3a97ac9b2393d5a92660c3ef1bf96805f963af2fea33c6892b2cd7602740e3c257cd25fafa4ffd755789362b1134", 0xac}, {&(0x7f0000000100)="6ce7d3c271ae08995dede4e9cf18e7de53288eeb02d1778420b0a7", 0x1b}, {&(0x7f0000000480)="848a192c8c4222350854136e2cacb2cbe5e695a3a2ed76c055a34e3acdaf59b5e032987d068b1a424c9be1eb7926bd62306b14737ae533917ba8d1d6a47fd90f95e5817787b85335c6f36168350128b37d5997c7fa1dbf0d3d4674d7514864b2dc840e1783f2", 0x66}], 0x7}}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x3, 0x4, 0x3, {0xa, 0x4e20, 0x7, @remote, 0xacd9}}}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 368.199597][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.208428][ T3279] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 368.219561][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.228285][ T3279] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 368.294387][T12730] JFS: Cannot determine volume size [ 368.299723][T12730] jfs: Unrecognized mount option "audit" or missing value 01:37:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:39 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="992c8d4232d9b614ada07fa21c3b253cba17d6250e2d63685add51f8446c5491f0d14587d1e99c407265a7c05380b02ea91e12e490217497defb01dbd8491924300180c8494fbf4d300a166a7da0e73224ef663e414e058e6b5ff9cc949d628d453dc8347b12ceefb431a99be4ba975a74a5d1271bb074b108f2d308c8f92d149d4641455cfa4107ec2f806d86e482ffcc853c46467af9c88e69e0560d010af3baf2c42b6f0a603fb8eba1f5556ddd34220ebfd9e3773264db26d495c94e393611300b6b4cc0690862054fd497be3af29cd2b905cb7e65bdd71102421fea64892ed53bb8249b8dee83d379f8fceeb766e104afdf6c32e430dd443b5c36a98ecf51eeac04144a3a38041530e6066cd287b7f511334c3a8b133a987e2236f892df08f936c175583deca23e32e8cd2a84608db4c45a2015bf293111e261e6b3786c5926dc1bcc2fd30ef5c72539f8f911106ad23c62d89d48f75eb379a3c3bcf8b3d67efce65eceeca9c078121fdd64f35c71f3f319357546fa939ddb776db7a8cf7547611ee6531a1093e4c95c872b66a899b7fa9674c1fcbf06488d78d3258ed5d14ffdef01b41e55e290ff38fecdfe9269e098b221e1c0c7ff04fd4401a58f824584415dfed0c8c5bdd5ee5199973bcd5588c5c70ca43c53d0547372a03cdc5c7f28a376ccad213f95cbbe2e59b7358b6e4526c0b29d019d2b0f2106e0463c99d0ac20a2310d7667f5e32ec9a5e9191dcf1135ae17f07cfff12d09fdf1f964f1622b42265f2db2a3165d0fcb3fa6994bc59dfab2498fb1084bd3a7d701f32c16e8d71cecd63c19b05ec9177553780310a18d545ef9ef170bddb5290977eb02ab3df7146f3c8fb2f597de5596dfe9f8b2caaca30a13c23746871271568b32f6e42eb77ac402d2b5b85f3b5d2ff71de651ee872bf23f5bebf90b94c0a1a6a15096a9197f43e5340f2dc91db30a19ba57b3c5378d3f3d074289b5db5c93d6615a43cf321513c4efd174f8a9a0e1fe9800032817ab5c0d7281d0b890ddb74bc7abd81496cd22c14dac298350c2f956233ba9e1bc6feaf1c675afa97622cb3063abef7e327095ca12ddb988cd057774bd7b5ea88f86041a6372528dc979f817de202a4dda7c826e80f9de054002a0bb2cec00c41c310da4c5ea89b4199f2fb6a32fc82100551f4dd77d35dcc5cba3c5b85a0e1b97b6881ebb6df6f599264d1ee24755ff4e9169a833281b200e9b2f764972b9a04f2b61a9c7a2ec8e15018b8f72c900ac016d186350aed985bafa3f8010928398f2129bdac1fbe7c9429d43e2708a4078cba3f721126ae1c030ceb99ab7b1ba68e67c57e02e2c6de043c177c6116e2e31c11dec0e2ab10302c7fb3af8cabecc36c24b4b890aea6511d4200d99a667754a893592b0288214b581ec65e2b16f44900e2c42e3be0db37110c9951fe5f90df8dfab719e0f1c5840a8ae21982ff515d017e591778ad9dcbe8611061c0340c0e3e9ed84d4e2282f277c1b138f53ab75b213a18927abd4c93378b3a3dc97886c296792febbc60480557248f9e7eb2f9e0e48c007bc4f75a944fdcbabea01522aba3b3ae795952262da2363cb3737ff176735fca95925331949290b8d29da3bd5e5e2758a8e5c6bb9499de1403228be8e9ea7b4b7a81559faac2c91fc32ad277a5bb4dfe8d8f3725ab1e1b7f1bce6812ccdcc299ce7391e4796ea3a45a59d63efb27d56b9e69323c34c35d9a161bfc439dad4cc31ae45713915741e876deeaeec83b1874d1d3fc349a16e03182b80f856fd767c75ee9c218ea9752292063247195e10511277f2ebd6d0251be2507698bf45861ee878e099d2339d3c8482f373c547e62aa98149ffd2855e68109e1d0668d88e45faf755b2e1bf043367da3b2bbf0c7f3562d7d3d45719f57209c618406a28985283c43175aef6783d795c93dbadd17fde8b1a9a09fd764a753f696560faba413f544b07e7b02c531c7baa58614df1e4b76b295204385a4bcac6b915dbfff117ef1a5078e51fd3e9cd97e361f1df8ff3c6018f264a35c078cf57b58dbb4312113dfda345ea67f4d72fd6d3033b807a5f36d2d00f553f56321ab08f1856033eddde0081897fb1d94dc168132bbf713a48ed2f825d1ff6f310b39f97007246df954d610f19268d8c3fb2e689b6c070", 0x600, 0x800}]) 01:37:39 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:39 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 368.676340][T12742] JFS: Cannot determine volume size [ 368.681761][T12742] jfs: Unrecognized mount option "audit" or missing value [ 368.918452][T12751] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 368.926102][T12751] loop3: partition table partially beyond EOD, truncated [ 368.934178][T12751] loop3: p1 size 3238031214 extends beyond EOD, truncated 01:37:40 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000040)={r5}, 0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r5, 0x4) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{}, {{&(0x7f00000072c0)=@caif, 0xffffffffffffffd0, &(0x7f0000000040)=[{&(0x7f0000000180)="7a260221d174e5fff7f0e30b9748fd09039cd697f40f02f58c476e046583f527c7dcb6fdbbd297daf3d263026c8aef5cfe91aa00ecb4292882f059081db9647decba3693494f7d55453ce85c4ad5210688b20fbeaafb5f8eff7149aaac584d0efb83cf5c3c62f7ebbd85b01c4b0716092093cacf0b3418ff8a0aa459fbc6855a7e91ba1632699fb3bb40717ab36b2a7fd6f22b68dd5c72c7"}], 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:40 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 369.129015][T12751] loop3: p2 start 257770150 is beyond EOD, truncated [ 369.198693][T12761] JFS: Cannot determine volume size [ 369.204553][T12761] jfs: Unrecognized mount option "audit" or missing value 01:37:40 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 369.435136][T12767] JFS: Cannot determine volume size [ 369.440483][T12767] jfs: Unrecognized mount option "audit" or missing value [ 369.630288][T12779] sctp: [Deprecated]: syz-executor.0 (pid 12779) Use of int in maxseg socket option. [ 369.630288][T12779] Use struct sctp_assoc_value instead 01:37:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:40 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:40 executing program 3: creat(0x0, 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:40 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f0000000480)={&(0x7f0000000380)="3038a42a81d437a0b5a0b018a2206a12f7e63f9af9aacf52da1c7c8d6c876be79325333d55737656049dabc0fcb10f08738cfcf08dfa6ea020350ba426e4cc065276e4ff015e825e79083438915ac448293c686e47e67a6c21241859e4253bae8395f95f46e07bdad5d70a9759aa152c32aea788ddeb5780050c81cae76de8dfd1de9121a95f63a3e31f438e521faf61c9de3456446421bd4d92c386ade0478b4a93f98503813aeded3fddeea0c0a623eaaeb64dcd2be5c4f034ce7b5cb7f28d51f52019c4fca6212d80efa9826173f0a642691b6ed630e7a4343bba669981a1d7bcbe9e813f30e24c76423e7d3e691d172f01f00b5ec485", 0xf8}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="0fcc66f185293fde6c3b2e62d250e1df88c53d0624338e4a1fd02da1000be3fb6e58283e45bdcd4a5b70c313e61c6b65fe5ef9b9224045e9fe86f87db5b4fe41d74082bd598a792b5bcdd637bade7afd37bf03df7d4618944e5978b8cb7491c13c6cae3d67e2451a02b249835aaf620f17ec2395b5b19fc80db2c886538f902ec65d16109327f71de7282499da1b040af10eaacb611f3d8ccbfc", 0x9a}], 0x1, &(0x7f0000000600)}}], 0x2, 0x20000040) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, r3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x374) setresuid(0xffffffffffffffff, r6, 0x0) r7 = geteuid() r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r11, 0x202002) keyctl$chown(0x4, r11, r9, r10) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r15 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r15, 0x202002) keyctl$chown(0x4, r15, r13, r14) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r19 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r19, 0x202002) keyctl$chown(0x4, r19, r17, r18) getgroups(0x5, &(0x7f0000000100)=[0xee01, 0xee01, r14, 0xee00, r18]) r21 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=0xee01, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="040001000000000008000400", @ANYRES32, @ANYBLOB, @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r20, @ANYBLOB="08000200", @ANYRES32=r21, @ANYBLOB="10000000000000002000070000000000"], 0x6c, 0x2) [ 370.197838][T12797] JFS: Cannot determine volume size [ 370.203496][T12797] jfs: Unrecognized mount option "audit" or missing value [ 370.257195][T12794] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 370.264893][T12794] loop3: partition table partially beyond EOD, truncated [ 370.272665][T12794] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 370.282861][T12794] loop3: p2 start 257770150 is beyond EOD, truncated [ 370.363501][T12801] JFS: Cannot determine volume size [ 370.368857][T12801] jfs: Unrecognized mount option "audit" or missing value 01:37:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:41 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:41 executing program 3: creat(0x0, 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 370.892500][T12823] JFS: Cannot determine volume size [ 370.897856][T12823] jfs: Unrecognized mount option "audit" or missing value 01:37:42 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x2, 0x70bd25, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:42 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000001180)={0x2a, 0x1000, &(0x7f0000000180)="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"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x0) sendto$inet(r2, &(0x7f0000000040)="baa0991a86350dbc8f5b25934a9013d69bc80be9ef53f808756dd2ceb5056aa571bbbc619fbfb4132ad386be6a4119144175f11df9f4bfe391b9c408f73044e78e254e5aba63b4b020eaf5d55f3a9fe93b07312f54b5de07d96626d2860597932c182c9b2a4f576756df", 0x6a, 0x44, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r3) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:42 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 371.232644][T12830] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 371.240118][T12830] loop3: partition table partially beyond EOD, truncated [ 371.248328][T12830] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 371.260310][T12830] loop3: p2 start 257770150 is beyond EOD, truncated [ 371.400394][T12838] JFS: Cannot determine volume size [ 371.406096][T12838] jfs: Unrecognized mount option "audit" or missing value 01:37:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:42 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x3, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='8'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r3, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000100)}}], 0x2, 0x0) [ 371.718980][T12852] JFS: Cannot determine volume size [ 371.725161][T12852] jfs: Unrecognized mount option "audit" or missing value 01:37:42 executing program 3: creat(0x0, 0x0) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) 01:37:43 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:43 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:43 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 372.336851][T12869] loop3: [CUMANA/ADFS] p1 [Linux] p2 [ADFS] p1 [Linux] p2 [ 372.344458][T12869] loop3: partition table partially beyond EOD, truncated [ 372.352261][T12869] loop3: p1 size 3238031214 extends beyond EOD, truncated [ 372.373020][T12869] loop3: p2 start 257770150 is beyond EOD, truncated [ 372.378608][T12873] JFS: Cannot determine volume size [ 372.385239][T12873] jfs: Unrecognized mount option "audit" or missing value 01:37:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) recvmsg(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000100)=""/58, 0x3a}], 0x2, &(0x7f00000001c0)=""/35, 0x23}, 0x0) 01:37:43 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:43 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x0, 0x0) 01:37:43 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000240)={0x8, {0x9, 0x1000, 0x6, 0x6}}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:44 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 373.328001][T12909] JFS: Cannot determine volume size [ 373.333754][T12909] jfs: Unrecognized mount option "audit" or missing value 01:37:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r3, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r3, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000000)=""/107) ioctl$VIDIOC_QUERYBUF(r3, 0xc0445609, &(0x7f0000000500)={0x5, 0x9, 0x4, 0x1, 0x6, {0x77359400}, {0x2, 0x0, 0x0, 0x9, 0x1, 0x1f, "d973f26d"}, 0x3, 0x3, @planes=&(0x7f0000000080)={0x0, 0x101, @userptr=0x2, 0x400}, 0x8, 0x0, r4}) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r6, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r6, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r6, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e23, 0x1, @local, 0x7ff}}}, &(0x7f0000000580)=0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f00000007c0)={r7, @in6={{0xa, 0x4e22, 0x1, @mcast2, 0x7ff}}, [0x4, 0x100000000, 0x1, 0xdd4a, 0x0, 0x3f, 0x2, 0x6, 0x2, 0x6, 0xff, 0x3bf4, 0x9, 0xb52, 0x9]}, &(0x7f00000008c0)=0xfc) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r10, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000300000014000280080002009d01000008000200060000000000000000000000000000000000e413349768af442c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r11, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x60}}, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, @can={0x1d, r11}, @ipx={0x4, 0xfffa, 0x7fffffff, "4deab18688e7", 0x2}, @ax25={0x3, @null, 0x8}, 0xb9, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)='dummy0\x00', 0xffff, 0x0, 0x4}) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000003140), 0x20000087}}, {{&(0x7f00000072c0)=@ll={0x11, 0x18, r12, 0x1, 0x6, 0x6, @remote}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000200)=[{0x78, 0x10b, 0x401, "1632c494968680156510809e678f02a4f10ac56e2199019dc16ab38c9d3151f966f4c47b4ac2e90067b00563ce4029799e5e328bda788bfab7a2c8e07329b0ad3968dab204c97e64b9ab0c85c34bc011fb6a7e7a811b0596d0b8112f80f02cd374e400ae9df3d121ef"}, {0x40, 0x105, 0x5, "e6684e23d0057d8a55557daba1d34465ce1b2420f18877c680eae7534b8e2148fae12e7e5986120cd503d20456ad2395a69b"}, {0xf0, 0x108, 0x6, "d32067b1bb49f7614a7c91af020d0b715863a72a913fa7f29b50cf78cdc000f74bc8eb3b42d1616f02ce584a2ee6d19f53f4e9bb0cffa316e05c427f976539f7500bbd4ed6019ea7bc3cc9bab6a0a8312c8b2de9613fc7dd4035bdf5bdd177927faf03fd5bbe1fca8a5412d965ad6dc43d23d2889bfbcca0c768d72b235eb357233a56c731356489797e33342b76bb7f127d9d1f095f384c2a4934fdd28447683fb8d7de8dda4e892c740d106f78737e529ecd1f58f5f735bcb24ff003ce14c202590129ac160facb9456d9cd778d6203a506bb82c174c2c7c63b0e5b795aaba2fa5c5af"}, {0x10c, 0x11, 0x1b29, "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"}], 0x2b4}}], 0x2, 0x0) 01:37:44 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 373.814948][T12923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12923 comm=syz-executor.0 01:37:44 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x33, "1d71f9da4419eb47e3780fcdddd087074db21e82e439be7a927abdb56e895e88", 0x20, 0x8d7, 0x8001, 0x4, 0x2}) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:45 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r0}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 373.922124][T12926] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 01:37:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 374.010403][T12926] 8021q: adding VLAN 0 to HW filter on device bond1 [ 374.274189][T12936] JFS: Cannot determine volume size [ 374.279643][T12936] jfs: Unrecognized mount option "audit" or missing value [ 374.362970][T12931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12931 comm=syz-executor.0 [ 374.382844][T12931] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 374.463306][T12923] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 374.480269][T12923] bond1: (slave ip6tnl1): Error -95 calling set_mac_address 01:37:45 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r0}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x3f7, 0x4, 0x70bd2a, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x40050) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:45 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:37:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 375.165506][T12963] JFS: Cannot determine volume size [ 375.171403][T12963] jfs: Unrecognized mount option "audit" or missing value 01:37:46 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8001, 0x44000) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f00000009c0)) 01:37:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x2, 'lblc\x00'}, 0x2c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x84, @rand_addr, 0x0, 0x1102, 'none\x00'}, 0x2c) 01:37:46 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r0}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2bb09619c2145031992f90a47f6b572a2033297783c3f813d1e326dd4cb3bf2da47e0826eec02359fda236c01b71766315614233e89f17c1e70a932659f4bfa78ea33c5c151a2b020508e2665d12145cdc315d6eb58fef864697ccded2eacadecfd78d8c4da3689513f4b86f6f6e3c93655e7274d8c9", 0x76}], 0x1}}, {{&(0x7f00000072c0)=@un=@file={0x8ed4ac103bd61014, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 375.890243][T12980] JFS: Cannot determine volume size [ 375.896450][T12980] jfs: Unrecognized mount option "audit" or missing value 01:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:47 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) write$P9_RVERSION(r0, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.L'}, 0x15) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:47 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x2200, 0x0) sendto$rxrpc(r0, &(0x7f00000001c0)="a5b208b031e24f1d94fa02260b74ac2bc4fb43ca1c6bb530c5b065b987677eb2ec25504db201e7edca9819cef14554dc28edc37a25c835672267fdcb45a978cde071497057c0493baa6123b1bb26c2d0835444706bcc9fceaa28c9df57457f637e00173280e8024682475503261e00f2e96fba00be8a2a9c965b9f0cbe9313db406f65767df4324aef0eaec95be09dd3c6774c6ea18f90587a7b1ce08226a50a322b3a672d6fec4c304c9633923ac2788035d9895332129ef62237cffec7cd50f00319f9c7ead52497ea75dbe47e383aed2b802d88569463f97d76d2ef94d8e0f5efa27360bcd229b47d467fd9c432", 0xef, 0x4804, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000002c0), &(0x7f0000000300)=0x8) fchdir(r1) sendmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x2, 0xf5, "c964af51b3ac067e527152a32fa90f06aaf7f261e238ac795fc1828832a8fbde20780620ec062e61d4bb6ada3a76d979acdef0e6c00d02aabecdd84ce91124", 0x8}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="9781dea667b0604534ab381accb5fcad8c47d4b71efd0b7c3211acc5307a575efd7f91608c2c645ca18679908738d2148fe2d01cf8f7b326c07b0a563b195c5a0beb2fd595234e2fdb56f0743af51eff042e1796fb6681e01e57b29275154db95a08e58c9b22c2fc32cea212d1a4b6e0ef6431", 0x73}], 0x1, &(0x7f0000000600)}}], 0x2, 0x20000080) 01:37:47 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:47 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x9, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='sessionid\x00') [ 376.507523][T13005] JFS: Cannot determine volume size [ 376.513517][T13005] jfs: Unrecognized mount option "audit" or missing value 01:37:47 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:47 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101200, 0x0) syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 376.892739][ T32] audit: type=1400 audit(1583804267.937:63): avc: denied { map } for pid=13015 comm="syz-executor.3" path=2F6D656D66643A73797374656D656D306D643573756D24202864656C6574656429 dev="tmpfs" ino=35579 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 01:37:48 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:48 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 377.176883][T13036] JFS: Cannot determine volume size [ 377.182873][T13036] jfs: Unrecognized mount option "audit" or missing value 01:37:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000440)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000001e00)={0x2c, r3, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8}]}, 0x2c}}, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40044055) 01:37:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000180)="02723e75bb04aa809f1d437af07fe57806b927bb31809c3374269bf65274a601aec83a41c851c00ac5b4031fbcb7077759de5ffadae4b29cf4a327e0c6a6152f66e90312f515bf289941bc3aa193a5db36df525e743933d84a95d40d401dc72890721acd5664d882c338c7553ad350542a72cb808831a18143e62a3e69e659884df856228d2b70f6da8e0e4867c3036a55272e51577a22937824836b2e2337b8cb29185b10e6a9397d35b6ad77ab1bdaf39f8f9a521c9f1d357db6f69be8cde26e89b16dff7e85adc7eac51ca328278579e564ffc348e7ee8c0e5417d40bb9194e") [ 377.730235][T13059] JFS: Cannot determine volume size [ 377.736030][T13059] jfs: Unrecognized mount option "audit" or missing value [ 377.901466][T13063] JFS: Cannot determine volume size 01:37:49 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 377.907379][T13063] jfs: Unrecognized mount option "audit" or missing value 01:37:49 executing program 5: r0 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 378.118511][T13045] ISOFS: Unable to identify CD-ROM format. 01:37:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="62489a7abeca160f4f9a1ad2d8edac4778f16fbb05f2c174b44eee6c3b9de3e00a600a91fff4b8b7cccf376e2e82e6714e0f7f53bc4584a88af6a89e24b56d268f066b221079752f410753b43ae5d640f87f8c94fc08a0f3aa96a418e13250e9b07ce174ce17bc046e914f285634035c3fb5f80f266480b74a41c531b1623ffdc2bc6279cdf7ee1c057e1433a2fbc3abd126cc016e6d46d5709d8e3a0d45a3660b7e9f532b4f6e9b731dac6bfe3dca67b88817b622ac2db6dadbe2fe64873e"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000040)={r3}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7357, 0x8, 0x8202, 0x6, 0x8001, 0xab, 0xffffff7f, 0x6, r3}, &(0x7f0000000180)=0x20) fchdir(0xffffffffffffffff) socketpair(0x1, 0xa, 0x80, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$llc(r4, &(0x7f0000000040)=""/92, 0x5c, 0x20, &(0x7f0000000100)={0x1a, 0x110, 0x9, 0x6, 0xd0, 0x6e}, 0x10) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 378.680109][T13045] ISOFS: Unable to identify CD-ROM format. 01:37:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:49 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:50 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="ab"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x2, 0x1, 0x8}, 0x2}}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 379.040927][T13096] JFS: Cannot determine volume size [ 379.046759][T13096] jfs: Unrecognized mount option "audit" or missing value 01:37:50 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:50 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:50 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4000) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0xfffffffffffffffa, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 379.625608][T13128] JFS: Cannot determine volume size [ 379.631105][T13128] jfs: Unrecognized mount option "audit" or missing value 01:37:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 379.858525][T13116] ISOFS: Unable to identify CD-ROM format. 01:37:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:37:51 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:51 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000580)='./file0\x00', 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:51 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x8800) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x4, 0xffffffff, 0x7, 0x6, 0x16, "99b2e8b1e18198dac32f6b3bff35b447a07d8f"}) 01:37:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x20a, 0x5, 0x5}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 381.098891][T13159] ISOFS: Unable to identify CD-ROM format. 01:37:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:52 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:37:52 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000000)=""/107) fcntl$notify(r3, 0x402, 0x42) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x2, 0x1, 0x1, {0xa, 0x4e23, 0x1, @loopback, 0x7fff}}}, 0xa, &(0x7f0000000040), 0x0, &(0x7f0000000600)}}], 0x8000058, 0x0) 01:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) ioctl$LOOP_CLR_FD(r1, 0x4c01) sendmmsg(r0, &(0x7f0000008600), 0x0, 0x0) 01:37:53 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) [ 382.398942][T13209] ISOFS: Unable to identify CD-ROM format. 01:37:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', 0x0, 0xc96, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:53 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) [ 382.766877][T13235] JFS: Cannot determine volume size [ 382.775523][T13235] jfs: Unrecognized mount option "audit" or missing value 01:37:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x0, 0x4, {0xa, 0x4e24, 0x25, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}}}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f00000005c0)="683bf535b9eee45ba7f1a8fbd9deb8d06bb70a387dd1323b85f6753b30dbf851ea5da15613bacd228ebc4ee5fcb67afae75ec6090c211c36ca42d218e4891d9e1cc2edf1eb2f0a3611d5d15b7204a74df5439640b8a0276d6c42d72b24048bcf6586c01613049c1eb3c753e96b6b18792d4bf746deb501d1715e842179bc5e553e264528f04702e7948dd3ef1c28d34bea", 0x91, 0x8}], 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 383.420796][T13263] JFS: Cannot determine volume size [ 383.426501][T13263] jfs: Unrecognized mount option "audit" or missing value [ 383.440214][T13260] jfs: Unrecognized mount option "audit" or missing value 01:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) mremap(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000009000/0x3000)=nil) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) r3 = accept4$ax25(r2, &(0x7f0000000000)={{0x3, @null}, [@rose, @rose, @remote, @rose, @netrom, @null, @bcast, @default]}, &(0x7f0000000080)=0x48, 0x80000) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000002c0)=0x6, 0x4) write$P9_RWALK(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) getpeername$tipc(r2, &(0x7f0000000300), &(0x7f0000000380)=0x10) write$P9_RREADDIR(r4, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000180)) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x22) write$P9_RWALK(r5, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000100)) 01:37:54 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x86, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:55 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:55 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) [ 384.444019][T13294] JFS: Cannot determine volume size [ 384.449361][T13294] jfs: Unrecognized mount option "audit" or missing value 01:37:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000180)={0x1, 0x8da}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4005c}, 0x404c844) [ 384.504607][T13296] jfs: Unrecognized mount option "audit" or missing value 01:37:55 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) 01:37:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 385.175619][T13323] jfs: Unrecognized mount option "audit" or missing value 01:37:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 385.236858][T13317] JFS: Cannot determine volume size [ 385.242757][T13317] jfs: Unrecognized mount option "audit" or missing value 01:37:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}]}) 01:37:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5d, 0x100) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/107) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x242240, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x7, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000000)=""/107) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f0000000000)=""/107) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r3, 0x10}, {r4, 0x11a5}, {r5, 0x2281}, {r6, 0x8000}], 0x4, &(0x7f0000000240)={r7, r8+30000000}, &(0x7f0000000280)={[0xcd2, 0xd6]}, 0x8) ioctl$FICLONE(r2, 0x40049409, r0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}, {@nointegrity='nointegrity'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 385.753459][T13340] JFS: Cannot determine volume size [ 385.758808][T13340] jfs: Unrecognized mount option "audit" or missing value 01:37:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 01:37:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x0) fchdir(r1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 386.213510][T13357] JFS: Cannot determine volume size [ 386.218850][T13357] jfs: Unrecognized mount option "audit" or missing value [ 386.251591][T13360] JFS: Cannot determine volume size 01:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 386.257502][T13360] jfs: Unrecognized mount option "audit" or missing value 01:37:57 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}]}) 01:37:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:37:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet6_opts(r1, 0x29, 0x1e, &(0x7f0000000180)=""/241, &(0x7f0000000000)=0xf1) 01:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 386.810048][T13380] JFS: Cannot determine volume size [ 386.815949][T13380] jfs: Unrecognized mount option "audit" or missing value 01:37:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}]}) 01:37:58 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@uid={'uid'}}]}) 01:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)={0x2e, 0x6, 0x0, {0x1, 0x2, 0x5, 0x0, 'attr\x00'}}, 0x2e) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) socket$nl_route(0x10, 0x3, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 01:37:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 387.587245][T13410] JFS: Cannot determine volume size [ 387.593378][T13410] jfs: Unrecognized mount option "audit" or missing value 01:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:37:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 01:37:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}]}) 01:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 388.168058][ T32] audit: type=1400 audit(1583804279.217:64): avc: denied { map } for pid=13419 comm="syz-executor.0" path="/proc/13419/attr" dev="proc" ino=37272 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 01:37:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:37:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 388.394110][T13442] JFS: Cannot determine volume size [ 388.399528][T13442] jfs: Unrecognized mount option "audit" or missing value 01:37:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) 01:37:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}]}) [ 388.806896][T13445] ISOFS: Unable to identify CD-ROM format. 01:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="eb090e4b20e3f87e3012137bf31284bde6d70c59652e199e59b9ebf1f4edb672907e586854b723711cbf1fe3b5b413a143972a23d9f5797f6a6885357080e5da32c6af018e77c616eda816db227f608c1485489552040238da6380d92858db02d3922912d6d86e193658013ade20eb9f550e2b6a6d34e27b5607c17add4248e3bdd44163e4f923254b754db93944f7f779afc3b0d103f460629d4419a43504e539c2f8dcc02d70137259b03eeb2635df1a102f41072164b98de2c38e4169dd34e0fe019754ca102c41d32b92f8d682c085dda5fdaefcd766c87c9c466e7cde39fdf7cea5af981f5f3f10ec868fbedaeab6b167bbf1bffc7486572e3677e586223104c0d74f4306927ae6cea47059bd69923d38b12f6a6ff7cafce56896bd48e1bfef187103876acc76db85184992890926d8e9e510c34f5572e5a17880aefb58b98a3d2a94d597323cb99ffde9775b556939633706b5d34edee5234af74b239ee4298ad870aca491fd08ee0310305caf403c3e0ed9c21bfbd426b8cc7648e4de0c26581e5ac71737b8403e428c790c9cf797f66b70ecadb1c073b17a46a0b3869b3394942ea3f2b1ebca2c461ea045d0ea169328b93245911fb2bc12581c29e4d1d18b98e1288e9211ef0da9202079440faee5a5e2caca2f84f7cf7b5f72679e025fba3dac0ff5752dc28d7ddf522e4ac1dd7a1003b37c3705963d8f2605da63375d8aa436756611aa516155b5d565e2ae88f2596a76c76e05f313a8dd7676a809bac4582a11cafc99af32bc87f9c0f04e2b281a823013ae42a20cc257fd2aff63da6664b07bdf6ad8ad535d6d44580f9a11a60801cb94d15ff6a684ef7c1f465f7785841bff340360f161165d7b090a76f182ef06894afd4be8fae2f0c7a3ec2e99a592c6fc3338baf40a6e8189e92776364a3114d446829f3d76afc371543e62a69885e237039a59d64fd4faa62dc70be4c9e69830dccd146ca3559efaa2196213286a01274b7cea21ec9a3243bc7ff2fd3bf9cdc3a3e599d26aebec680436185112c99e06f015a5d2b109bf576ae14dc50f8b41a06f581371dc32b3e337670cb9ba3a3e74c6ee91b5d528b65be5f574669e91c59a2ef3f46ee0a3be920945e0b01f47237aa2084130850b7e6036fc85afb873540177937836f5a1396532bde81cd1d7b3a29052bf2f289b8031e8e1b1cb955723adef65c207e3cb42f36789145be8f64c075d0eb72d9b16deace6b1849729b4ef8af6ff004659f7d4a55cc8fa8e6385767155c1d9d10143757ad0c9c5177eb6561552a51d5c6d8a1c7ce2a3b2b461de06ab06833c3f3a5f271ec7bd78c6de9f3ab686e2807d21461f1e4512f095bd39923dc2d9d5036fb385faaae256a022012c1d2220a2a3ed63e31622c9a64a1b96c1e5fa5c26d814f665f804fbcd0fbd82b64cb8b089574cf8aa72dd0614e25a3d2f34525a233fb8fbd2f8b4217d9fe2736d8306e6a14ec82d45df3fb6c600ff7fba542c3fe3011700c437d719f3c6550211edaa270011abe57de6fe385b3fed64824a77a45505b3d4f367aff39b622dd48b2fd995e9fcbe4fa15b951f3e3b6fcccd89be9ab7245c99a0a8d6151207b4536d14756201cad5788d5455f06c49ef53c5b98690ae3302e1f19496aaf322a8e5b68a209863e59458419f7933a42b7b2f3135802b5271b9dbcf758c7db459bd62aa9b7c6579e2c32adc46652635fd4af99e6fbae6d3e1947ec12828bc037385c4c3dd3b0dc2cfe5607a28e7d87cfb32e9fe5f55dd14ac116fedcc3e98fff07c2f6a08689a999c88d767b93767a26695a0babae71287d82b469ed739e9ebdec8f36d0c0166c7c69456f575121635a50ae49bb8fff0078ee8fa71025f32b302facd425d39c6124ded0469c86ef06b0590f308010350f9b21b6a3ce8c74cfe6acb2e05f1a38a16323866b82bcfbcad559d6b48521d6b4bbe2574aa86510a85ddcd3466fb7db20897c71b2caaedb6c5324ed8ce101cb79387d654d8c450db9f24bc44543d4cffc6a3d43b4723527ec7c4fa5b8846dcdfc88c80148a29812bff39839fdc219b4232363cfcce37ffa0d89d4f096907a9349315f9a1d7c2f8e9bd5eb23984956eba2d2dd968241ef1234a66f8fc35199f14dfc4135bda4bf2acf0fab289fe5004723982372eebcf6ff04c60cf82db718ba5d9d4fcaff62e76b02d8105d056409c678fa81e4b64e4e92a7ea8175b3030e6d76a367a19519f5868b758a73601bdd8a293f5f1cb1193cb057ccf98bbb33dba5f9f274452fd6ec43c0028884640c1b28ca846aac5dd19efdc2e58a8fb63574cc6c9ce2e0a5f6c4c4d5c90c90aee4f38bfb913ec6b54ea3c180b855d8789933b61b420978b5204c3e17d1b3460c678371dc83e6c543ad7fdab1a8c893f8ecce1a2057978c8a3f617ede1f499868a62dcc5db86db22701f48c0666e0650289bbc52668fd0dca5a54d11a78df0bd1edf6aabff688d87f62cb26432adb178f30b251cee2f0fcafdbbc8e545f34caf8655b202f9731c54fa547f96d86b2ae4bf7e7b57e4f35d07a3774c24490ac3791d58d605879dffd8f55b55abad787aa43f102670492427df748da0ed9d046cdb386b3da9a75097f5423978d464ea41a596569bed4fa565df98502bcbf6f8fe02c31bd754fc27ffab0c34d567a295c8420027d33964d38c489d1702dabaf74c150764be138d5e24247f728282f3667464c2ee3f404da20e5d6db41cf01a05529fe5c25a4eafa2240054c1f42fe70d0f3d61cac931cfe3a9a83c0124fb16e6bb8f313256f7d43de030f373b3c5437e5fe2d8a8cd278401fb86a8c12ace9d34a36c4ca64ec4e92eaafc86925c1343f666becd3a96fd32d5bd664b46075289eff106b53f0aebc0c26b56ee4f3a8faa404fd4f563357a8f7a88a77d7c7f7ecf5b0a06055ac1ad8d20ef2c3fa31825c199142c81c78c6a1a813fd69bed44130a60b2ff39adcb539e238c4cfe65b0eb539600a2f4d7801d6dbaab714034e668ce167340f59bc9d46f87d350ae0841782bc57bda734fc0b028f9d7f5da82e503e8a8651e829d8f63e2831ff12d87428182d2527d46ee3b284a077876c4d8da39db9a9d76229b91d3363f6e20f139b999bfb2c005dd9f22fa75f3f5226e19fdf4576f544ffe1457717879a987c22bde5254bee21ee67ef820c50348409d40c00f560c884e311068873b716c5071e5d93553fabb2c00870702e581bafd014a74d92e78562c3705585e3b9f2af73e48f222de132e80d297e10f65398b0f4d063d1b8444c6d936d12910016b9cf8c7c63ce6ecd6ab33a1c1ad283d5efd94d18db5c0b2b156320beb738cd2a80935024e5277c0bbd8a50a5fcab983aded8a08c64bf6dea04687f8a7da7a908a0fa6c5bfcbbed4f8fa32bf71f2adc7cd8f77c8fb2d8b83ef3f99324a55484d28d2cd50302e937b634ca42fa90dd8870a63937ece74df86efad8be88497e378e1fcbab03cac3f231d4033cdbd88e0799b1e06711d04b092beb48421b4f31f22749f01574481a08a1fb25576d24dbc4504c2469ec506984aa0d4e982a592867eea27c8b220c3b475cb714b3c7151b6294acfda048ed6f43aa69aa0ef5bd6b6a50a810fbef6795ce63db5b8f700362842e54867f96244080999a260b2288eb64d46697e8200cc8099e4269f8204f9ae12fcf245baf194da1a9043f7daef869757e75a83272da0f8b61970236da1e8a6628f0f547c0aa0dc67b2c18de4144a8a7cef03dcd94256f6362d753beb2d216af518318c22453d9b19deff008d801f80ceb7f9ce1ae120ee24971bc061beb46fca8cfe6dbb954338f32d628652fbfdabfb145761f92eb9c8768691a26369a1049d23533def96a57b55975e35ce9692f8674deccd0fb29530750e9828d3e1641c18f9697a843c476948ef3e35f20535303f64f6f0cde047896b9c1d1ad8becddc8df661eba08d5a9e4e124193e6ce4588f5976bc013be2895a6fbab784011554baa9a2cf028bcead1cb3a8db4cc4e72aea1eb6c0b93d7b598c6ebb888deab4954b9958607bf430f228d223257b0ea8b351f7e4c632a9327e8d5d5bc437fe1f26b1811e45cce9c06ce710c46a729c50023458c874d9d6e2d7eef96339324c624afc307fe50e3165ddb3afd07ab0d143d22d59210f8535f2b2a71c512a1c13aa95cdecb4cca5bcfa1d3a07bc927abd44b8718d3c201bb0d0d04f4cbd36ce51cb58158e99e5f2845249868bc0e89493ee3318eacc918fcba54797350c91da7c1445ac5f6c5b4c83c3e181fb4a7cb72282ab244eac6baaab2cfc3cd95946edeffdebd3ba2f874be42c0cd781828069e6fa146be8ab111274ccc7dbc8e460e516faebe23149edcdd186eba545b7fcd2c343178c0499c8335aa5c75f07e8f03871a0ab7b364320bd09970ff399ad53a2e7032c73fe15d392782f785eeff6d6fc901a0b57fef5951f10088618e7076ab9f559897759a21a35248f8ed0c27c53da85fed43098ef380b0e176361892f6e6bcb37d71f62d868151b097f7bf609c8ab007c3501fc7d7cbeae83a45bbb4bcec9048d10043394f74f7fbc858ec119f36c8937aad1728273e0c5cea74b7b559b8812fa731705cc678a17e3b5bc5def8fab66ba8d84ac039ec5d3a556e577350569ec6411311bec5df96e92b63b03b7508892798f43f43588150edebc2f12f1be769dcabd9d19203f2a3770a375409bb8b703f733f6a11c7a0a8ccc722151ac415a5e368160c0fe2ae8f7349e3c8ed8453ae915049712ac320bf7c13a5652fb38209bc4a491ca954ffeb1722db9c57b5adf9fc4dc0bea1ccfdc6812146982f92543d0e89964ceaaf6d0f1a962e5c3ae8b6bdf5a14232a18a4a5f3d19c42899db918b1a0e8f2f7599875865793d21d01ad592060836067c3445c560d22519f1b84c753b3ce3ce6c2b025f11d00f1b77f73cce83b3ea1228951e11feca3a6532b8c8fcc9b7c0399e75c4ac39dbda0aea497d7ea6df6b396fadaa8fff5a7558cd89060ff48e7e6a5bb98c4b8965c6336a141291472220de5e8920af38bdccde796220dcd5aeb1c70144148f5df1df8ec49c00031e5d04c370f22b37c80f73f4629305ca537102eb342ac45bfc463b72de376cd6ea3d2d0cd1c4abeacd8c689870b8f77cd844953438e46dd38f3fe03af99d9281e77a86ec151e1241ace49af4c55e531c9b420b4a70b3f44a92ffddd5de3ee3c3eccdadabebc78d857dd4eb8adc0714ebee6d618cce25bff4bcb20a42b89d62ab96d2c2f461816920c865b3d8f60b4946c4cd481864b55cc7bce6c0248761814e16f0bcd228bd1d03e7735f8091239791661b298433cbe76609ecd7612a706028ea0cc14e2d1f26a6236ff36c01d10631fb17d599c0f0fe5a26f719d6f558390dd244ae464226a37486ce207af056a55a634866592dd3811c7890aadd7db02bb45782c6d9ef3f517079d2a995e77c1e2fab50cd608ae894aa7223d551ed5d4971722cbbc3252088ffb16b9eaec335d63218fd4fecd2b15a9416303ca30d78421e15cd83d88cb9355bbe52301056e0076e2dc14b18f007c18a4ce438a4af50ce9390daad1d12115bc111b414f89af3e3c62b02d9bd8d995600cf619dd80e2fb6a63b38de8b4feee53c0762173af63aa61ff6dfef6c48616c8143a4020b8da3044593848ce9e4627bdde9037ef0b7db9e90d7ac3da78295cd379a15cf9a6848e18c32a94dcb0f7d2a2580ce14713cbcfb7a377a3c37e8b4778c1f6190c487d6630c39321e52ce05b55f2c4c110b8e41cd754ab5131b714485b54595ea", 0x1000}, {&(0x7f0000000000)="24280e4d5b8eef4be47fe7b2f6dc9546adf46b18bc644fb4ec8a4b54dc94df65fac40f178a3d0e34779404e8", 0x2c}, {&(0x7f0000001180)="f36c3efff197167cb26c1164779e08c3d5c71d5538dbad76f3609352e20eb6062e5517cdc694851da149934d9ee0f5ad56e426cb3185bb0b1c3f899abfd89b37b51b220493c6e147d76c58074d27f33006cacd04590faa823884238d37fa0d9005ab8fead16c1770bdc2747ce89c11d888bc8e997ccc048b5ba31966dd98c769e0c0a0889fcffc9cd8ac0edcc6d95d2e9b9f8a5d8558296e0f1b4b0c85a0aca27d33d0f993361cf0cf71e7d78b10cc0e9f67914df96e9db852d540f1d33987cfd01c28da814a83082acd7245ed71986c0f8fe36607883cd88e486c", 0xdb}], 0x3}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:38:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 389.194968][T13467] JFS: Cannot determine volume size 01:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 389.546688][T13483] JFS: Cannot determine volume size [ 389.552607][T13483] jfs: Unrecognized mount option "audit" or missing value 01:38:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) setxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000180)=@v2={0x3, 0x0, 0xd, 0x7, 0xe5, "b04a2e0d8e9e8b1ebe71fb15013e83ae37d93c2027f2e085f28f5e68302b66bb920980f70fd923fcbf8c6631e2ad9993a084c56e11c365f634c871cb86907699910fa39fc7b1ad6f11c5f881268d4ebf56ec02d0d61dc3a5fcea280639e2cb5346e15cddcd9a54c9db0786d224c05c6da9f9d0a51880c7adf9f3f1dff6e94fe595bc0c4ce5effd9f8248183874507b35bde20df799bec3f0bf73501162ca8d3742e5c2c410eaada95daedb59246f08d81f850ad60b7949eec60607b5be5e713c66b6ff25d318e4f3dec62bd415b0ad676b2ee58408b676c4de29740b9f6790a3ae0ad1a6c5"}, 0xee, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="85fc33bb803050dd4871a512", 0xc}, {&(0x7f0000000280)="9ffb017a718a0347b4c9f2d028fb377f4fe46cbbea9c294cb2c88b4bf496c9a81ec1d56c88ca1d65bb82913e78c14a82556576f78c1ad855d213264ec556f8ef38b1f85c17418a132e6c9095a701d6", 0x4f}], 0x2}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000340)=[{0x7c, 0x84, 0x80000001, "e13b9562adbfbff0238e1aa601bcd4bd701f7d6380e235dbeaf187f1f3c79a1a38651fa8a2a649d606c21ad4a1a0d84bd67fafd63bbafd335a78e4411704b97a50a10beae4ef7a1bdf66249ce2c41d47e89e22a7b7eeb487e80e4075f08f43cd4a8862e6ff9e8fc34358db3e41f1"}], 0x7c}}], 0x2, 0x0) [ 389.829181][T13485] ISOFS: Unable to identify CD-ROM format. 01:38:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x16bd0000) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) 01:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 390.167747][ T32] audit: type=1400 audit(1583804281.217:65): avc: denied { read } for pid=13496 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 01:38:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 390.348159][T13511] jfs: Unrecognized mount option "audit" or missing value 01:38:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x78) 01:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4ac040, 0x0) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000040)=0x9, 0x4) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:38:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 01:38:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80104132, &(0x7f0000000000)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000000)=""/107) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 391.118932][T13536] jfs: Unrecognized mount option "audit" or missing value [ 391.156074][T13525] ISOFS: Unable to identify CD-ROM format. 01:38:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) 01:38:02 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x14001, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 01:38:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}, {@euid_gt={'euid>'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 392.143466][T13562] ISOFS: Unable to identify CD-ROM format. [ 392.244492][T13571] jfs: Unrecognized mount option "audit" or missing value 01:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) 01:38:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, 'em1ppp1wlan0'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 392.891129][T13593] JFS: Cannot determine volume size [ 392.896790][T13593] jfs: Unrecognized mount option "audit" or missing value 01:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 393.095300][ T32] audit: type=1800 audit(1583804284.147:66): pid=13581 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16870 res=0 [ 393.204261][T13589] ISOFS: Unable to identify CD-ROM format. 01:38:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000140)={@local, @link_local, @val={@void}, {@ipv4={0x800, @igmp={{0x17, 0x4, 0x0, 0x0, 0xffffffffffffff35, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @remote, {[@timestamp_prespec={0x44, 0x24, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@multicast2}, {@loopback}, {}]}, @generic={0x0, 0x10, "845a9f178cdb7696c96df74eff71"}, @generic={0x0, 0x12, "8451269a8fbcc402be4997714237a169"}]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 01:38:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) [ 393.599934][T13615] JFS: Cannot determine volume size [ 393.605948][T13615] jfs: Unrecognized mount option "audit" or missing value 01:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 01:38:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:05 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x7f, 0x7, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x40) [ 394.097787][T13632] JFS: Cannot determine volume size [ 394.103389][T13632] jfs: Unrecognized mount option "audit" or missing value 01:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 01:38:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 394.375556][T13626] ISOFS: Unable to identify CD-ROM format. 01:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 394.485239][ T32] audit: type=1400 audit(1583804285.537:67): avc: denied { map_create } for pid=13641 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 01:38:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}, {@fowner_lt={'fowner<'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d2f09ff060000000000001c00"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000029008b85ad52357b5907608e0000e5ff", @ANYRES32=r2, @ANYBLOB="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"/1262], 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) [ 394.903801][T13652] JFS: Cannot determine volume size [ 394.909136][T13652] jfs: Unrecognized mount option "audit" or missing value 01:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:38:06 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '9P2000.L'}}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 395.392270][T13666] 9pnet: Insufficient options for proto=fd 01:38:06 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [{}]}, 0x78) [ 395.726378][T13678] JFS: Cannot determine volume size [ 395.731711][T13678] jfs: Unrecognized mount option "audit" or missing value 01:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:38:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) [ 395.973738][T13686] 9pnet: Insufficient options for proto=fd 01:38:07 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:07 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="c800000010001fff0000257c3dcc96ae8b222080", @ANYRES32=0x0, @ANYBLOB="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"], 0xc8}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000000), 0x3, 0x0) 01:38:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 396.279670][T13696] JFS: Cannot determine volume size [ 396.285828][T13696] jfs: Unrecognized mount option "audit" or missing value 01:38:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) 01:38:07 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) [ 396.798042][T13719] JFS: Cannot determine volume size 01:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:38:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:08 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 397.144662][T13728] 9pnet: Insufficient options for proto=fd [ 397.253824][T13736] JFS: Cannot determine volume size 01:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:38:08 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) [ 397.378490][T13744] 9pnet: Insufficient options for proto=fd 01:38:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000009c0)) 01:38:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) [ 397.715866][T13756] 9pnet: Insufficient options for proto=fd [ 397.813082][T13758] JFS: Cannot determine volume size 01:38:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:09 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@resize='resize'}], [{@audit='audit'}]}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, 0x0) 01:38:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) [ 398.326617][T13778] 9pnet: Insufficient options for proto=fd 01:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) [ 398.409275][T13780] JFS: Cannot determine volume size [ 398.414891][T13780] jfs: Unrecognized mount option "audit" or missing value 01:38:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:09 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) keyctl$unlink(0x9, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) 01:38:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x78) [ 399.017357][T13798] 9pnet: Insufficient options for proto=fd 01:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:10 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) keyctl$unlink(0x9, 0x0, 0x0) 01:38:10 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:11 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0xee00) r2 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(r2, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) syz_open_procfs(0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x12f, 0x20000008, &(0x7f00000001c0)={0xa, 0x0, 0x2, @loopback}, 0x1c) r4 = open(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ftruncate(r4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000840)=""/197) sendmsg$IPSET_CMD_RENAME(r4, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x4b3b, 0x0) 01:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:11 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:11 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:11 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [{}]}, 0x78) 01:38:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:12 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) [ 401.074895][T13864] 9pnet: Insufficient options for proto=fd 01:38:12 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='batadv0\x00', 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 01:38:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:12 executing program 3: mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) [ 401.461382][T13881] 9pnet: Insufficient options for proto=fd 01:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:12 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:12 executing program 3: mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 01:38:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:13 executing program 3: mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 01:38:13 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}}, 0x0) 01:38:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="e665e408e6322a7a"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001040)=@newtfilter={0x478, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0xf}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x448, 0x2, [@TCA_RSVP_POLICE={0x444, 0x5, [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x3f, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}]}}]}, 0x478}}, 0x0) 01:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}}, 0x0) [ 403.257664][T13939] 9pnet: Insufficient options for proto=fd 01:38:14 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:14 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x0, 0x1c9c380}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 01:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}}, 0x0) [ 404.128582][T13960] 9pnet: Insufficient options for proto=fd 01:38:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) [ 404.206548][ T32] audit: type=1400 audit(1583804295.257:68): avc: denied { wake_alarm } for pid=13966 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 01:38:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:15 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x380, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x9, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='sessionid\x00') 01:38:15 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="66ee4ac429d97b2323be24f411d0816da7b9f9f96f1700287c070f4a856b0b6c1673b3d970c9f9203198eea52f78702ec0e41dace23c5cb91b1ed296af70a487c314c488ff135358ed51bb341e49a9731fc75f2e5eb794427526a4e556a2ddb8be156d6abab3b6c644f17af62cda0377b3447217b33cac3bcf9a3fb44597908770c3c2f3abaa03077ea5e7de6ec5446bf145fd1b7a04eb8d13a56c70ebf090475f2607ec7e9650b2ee71f311c6f94cba64e51950524c6bacd5aab004810399b07cc8414a00448efbf6f70509fd8464c98a10e34615fb70b18190a4d5f9b70f42c6ac377803b735c9b51b2273894989ce9c94fa46", @ANYRESDEC, @ANYBLOB="000000000000000000000f000000360002000800010000000000040004000800020000000000080002000000000008000100000000002c00070008000200000000000c000400000000000000000008000100000000000c00040009000000000000000c00090008"], 0x3}}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r7, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x12f, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000100)='./bus\x00', 0x145042, 0x0) ftruncate(r8, 0x80006) sendfile(r7, r8, 0x0, 0x8000fffffffe) splice(r4, 0x0, r6, 0x0, 0x4ffe2, 0x0) 01:38:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) [ 404.904291][T13994] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 404.992767][T13993] 9pnet: Insufficient options for proto=fd [ 405.004512][ T32] audit: type=1800 audit(1583804296.057:69): pid=13999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16958 res=0 01:38:16 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb0\xe8t%\xfc\vw\x82\xdb', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x380, {}, 0xc3}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x9, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='sessionid\x00') 01:38:16 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:16 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 01:38:16 executing program 2: io_setup(0x40, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 01:38:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:17 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, 0x0, &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1a, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:38:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) syz_open_pts(r0, 0x0) syslog(0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 01:38:18 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) syz_open_pts(r0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, [{}]}, 0x78) 01:38:19 executing program 5: 01:38:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:19 executing program 2: 01:38:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:19 executing program 5: 01:38:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@privport='privport'}]}}) 01:38:19 executing program 5: 01:38:19 executing program 2: 01:38:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:20 executing program 5: 01:38:20 executing program 2: 01:38:20 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 01:38:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:20 executing program 5: 01:38:20 executing program 2: 01:38:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 01:38:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:21 executing program 5: 01:38:21 executing program 2: 01:38:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, 0x0) 01:38:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:21 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:21 executing program 2: 01:38:21 executing program 5: 01:38:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 01:38:22 executing program 5: 01:38:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:22 executing program 2: 01:38:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:22 executing program 5: 01:38:22 executing program 2: 01:38:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 411.707511][T14173] 9pnet: Insufficient options for proto=fd 01:38:22 executing program 1: exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:22 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:23 executing program 5: 01:38:23 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 412.067905][T14184] 9pnet: Insufficient options for proto=fd 01:38:23 executing program 2: 01:38:23 executing program 5: 01:38:23 executing program 1: exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:23 executing program 3: [ 412.483358][T14197] 9pnet: Insufficient options for proto=fd 01:38:23 executing program 2: 01:38:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 01:38:23 executing program 5: 01:38:24 executing program 1: exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:24 executing program 3: 01:38:24 executing program 2: 01:38:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 01:38:24 executing program 5: 01:38:24 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:24 executing program 3: 01:38:24 executing program 2: 01:38:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 01:38:24 executing program 5: 01:38:25 executing program 2: 01:38:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x30009, 0x0) 01:38:25 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:25 executing program 5: 01:38:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:38:25 executing program 2: 01:38:25 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:25 executing program 5: 01:38:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:38:26 executing program 2: 01:38:26 executing program 3: 01:38:26 executing program 5: 01:38:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:26 executing program 2: 01:38:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 01:38:26 executing program 3: 01:38:26 executing program 5: 01:38:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:27 executing program 2: 01:38:27 executing program 3: 01:38:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:38:27 executing program 5: 01:38:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:27 executing program 2: 01:38:27 executing program 5: 01:38:27 executing program 3: 01:38:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:38:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:27 executing program 2: 01:38:28 executing program 5: 01:38:28 executing program 3: 01:38:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:38:28 executing program 2: 01:38:28 executing program 5: 01:38:28 executing program 3: 01:38:28 executing program 2: 01:38:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:29 executing program 3: 01:38:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:29 executing program 5: 01:38:29 executing program 2: 01:38:29 executing program 3: 01:38:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 01:38:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:29 executing program 5: 01:38:29 executing program 2: 01:38:29 executing program 3: 01:38:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 01:38:30 executing program 5: 01:38:30 executing program 2: 01:38:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:30 executing program 3: 01:38:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 01:38:30 executing program 5: 01:38:30 executing program 2: 01:38:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:31 executing program 3: 01:38:31 executing program 2: 01:38:31 executing program 5: 01:38:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:31 executing program 3: 01:38:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:31 executing program 2: 01:38:31 executing program 5: 01:38:31 executing program 3: 01:38:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "609948a44c67000008000000000000000000f9"}) 01:38:32 executing program 5: 01:38:32 executing program 2: 01:38:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:32 executing program 3: 01:38:32 executing program 1: 01:38:32 executing program 5: 01:38:32 executing program 2: 01:38:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') prctl$PR_SVE_SET_VL(0x32, 0x338c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000240)={0x0, 0xe3acf919e73191e, r0}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x2284, &(0x7f0000000040)={0x4, 0x0, 0x0, "b3bb00ec"}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0}) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x1) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r4, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r5, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000100)={r3, 0x80000, r5}) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80206433, &(0x7f0000000140)=""/244) fchdir(r0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r7, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r7, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r7, 0x0) ioctl$TIOCGLCKTRMIOS(r7, 0x5456, &(0x7f0000000400)={0x1, 0x3, 0xfffffa6d, 0x40, 0x13, "9a2c3a5e27f6c75023a54b34a141250331bc6f"}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x4100, 0x4) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x4005) 01:38:32 executing program 3: 01:38:32 executing program 1: 01:38:33 executing program 5: 01:38:33 executing program 2: 01:38:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') r2 = userfaultfd(0x80000) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x3000, 0x1}) fchdir(r1) sendmmsg(r0, &(0x7f0000008600), 0x2, 0x0) 01:38:33 executing program 1: 01:38:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:33 executing program 3: 01:38:33 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) sendto$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f00000004c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="db", 0xfffff000}], 0x3, 0x8040000) 01:38:33 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280), 0x0) 01:38:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x275a, 0x0) 01:38:33 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x180) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 01:38:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000600)}}], 0x65, 0x0) 01:38:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 01:38:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r1, 0x1}, 0x14}}, 0x0) 01:38:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}, 'macvtap0\x00'}) 01:38:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 01:38:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) 01:38:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) getsockopt(r2, 0x4, 0x7, &(0x7f0000000080)=""/17, &(0x7f0000000100)=0x11) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000040)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r5, 0x6}, &(0x7f0000000280)=0x8) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r6) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="6d72cb1e31cad6620abf5660fb0014738c47d9eede34844d354c2d702c5337768905f9a6fee638d1ccd3f7283f914a5cb181321ab078d4251ef8d60d97ade2fd0b3fff7f214ea660dcebe3f685262e4eb336fb436b64602f2f44cb1d5ffbc2dc860c4eb0dfed7b2e", 0x68}], 0x1, &(0x7f0000000600)}}], 0x2, 0x0) 01:38:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002811200001c0012000b0001006d616373656300e10b00020005000c00000300000a0005c03a0000000000000008000a0009d35b587e27a8b0b9cad4a128c1aa7cf68a72e13e13201546eb249c27628b043723262ef1db55855e9b9c3c4f3d85375cfa53566d1becb85f7297cb072cd567309e4df2d41485c9b6a83c953a21aa4f22f55716d40a207530362bc729067a2c1827fb817eec56022b28d49a32965d048e336c6476967ed3c025b32265056d7425271b24a7a00c7f44c83d98fd505c6a5bed69ac554740f4acfe372790fb0130a6c5472d2c1863fdd50101acad39036ed430db5f4ba99a97b267f26fbcb9e223ab48d4fb4d48", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:38:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) 01:38:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 424.156598][T14506] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:38:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffa7}) 01:38:35 executing program 5: r0 = msgget(0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000008300)) 01:38:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='b'], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000040)={0x5, 0x5, 0x8}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x361000, 0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x1b) 01:38:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x5451, 0x0) 01:38:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x18, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r2}}, 0x18}}, 0x0) 01:38:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) 01:38:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="6326ffc30340a59af4c3650421f9a53779861026cd4f7ae2dcfdaef83c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f627927737456b54921f664921e1615264cc762cf6a4641c24401694189704152109b0dff9eb9ca92da732cc5b460a46383502d39192ed1257af1867305485dc560b67fa9950386e7d44374265b739aa0ef8918e45feb997445e598790400e81a0a90106099ffc40614fb95e437e5d5f0594c09185a98100af54231fbfd2720db23fd475c61ebd1380a9826fd69c6f64bf79710e7e1d75e2c791eb7b1d86588ef923b129222614c86e18924f9589b3296bf073a802c252d7bc999adfe63ad0e5a6481eae74204aaf21e9a35fb7506b3169662c7d4fc76e2e078cee8165c38d347ebd94c7d665d19eca077d22e964a372e6b5bbe228baa221945aedc235a5214900"/327], 0x50}}, 0x0) 01:38:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') fchdir(r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000000)=""/107) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, [], [{0x3, 0x401, 0x80000005, 0x10001, 0x4000000000000002, 0x80e}, {0x4000000a, 0x7, 0x7, 0xfffffffffffff000, 0xde, 0x3ff}], [[], [], [], [], []]}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 01:38:38 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020662a, &(0x7f0000000040)) 01:38:38 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8140, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r1, 0x11, 0x0, 0x0, 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x4d, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f00000008c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000000940)=""/202, 0xca}, {&(0x7f0000003680)=""/12, 0xc}], 0x2, &(0x7f0000000a80)=""/211, 0xd3}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x8a9e6d5097b8b4f5, 0x1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES64, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRESOCT=0x0], @ANYRES32], &(0x7f0000000300)='GPL\x00', 0x6, 0x0, &(0x7f0000000340), 0x40f00, 0x2, [], r5, 0x3, r6, 0x8, &(0x7f00000003c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x6, 0x2}, 0x10}, 0x78) sendmsg$inet(r3, &(0x7f0000002540)={&(0x7f0000000100)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000240)="6aaffb9ae615971d064cfa34c738f929120cca1fdb00a8ee79fbed33c8aef2722d88389a3e4b3e9e8081908daca596db98a2d7a4e4f6408a83deb692b898ff78230d1bde8219b9d9af731d69c87abd5ecdc528a7c352a252b723bfa4ac4b803a7cae381a72956f645d4798b4b282968d13f3ab1c9fbfd388edc07842af5bbc4b01456874fe9ea67a9694f9c2b2da9fe367c4b0e32560c8f2283effcb95e3468272f4ae69c86c4d274214d533de9f4e9cac9915336ba48fc97a72d156149ecd409db89b02d1c557318251d4e54590918b11a7b198a35522b1ae", 0xd9}, {0x0}, {&(0x7f0000000340)="9a95136e87577aa85753288a1846ea0350ec8ece475de0f6277f31e5241e9d5b0727c77c912ab5ba8998149bce3ac404c11a08e00441cec3a4c35978acc675c52839f23d9d9772abc3097a675509c6295d6656d6d63c4b95e13f", 0x5a}, {0x0}, {&(0x7f0000000580)="b28a6a95cdba310dda7579816774ef1936f9d6d5e2ff1f33bb0d69bf19193394422d5df825be8a44634cc098dfa7c494316a864e358c0e81cd52", 0x3a}, {&(0x7f00000005c0)="5ff50f04c498287cb18c72ed468f64518aacca40ba230def6ca633726ab42731dbdbb487f98462eb3654898c37a01cef9b6f741c57d5ff89c3f626cb59631b43f09717fe791c29f9dea395deb318fa7d78008948b04eb528ad49c30a87531289ac51b9d31334a2fae3d40160a58bdc5968ad332682f9df77833b73dd01c3de71e4f5e83fbe408672058add7c0fcdd86a7e57ae02", 0x94}, {0x0}, {&(0x7f00000007c0)}], 0x8, &(0x7f00000024c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x24}, @multicast2}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0x58}, 0x4000) r8 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x2, 0x3, 0x84) setsockopt$sock_attach_bpf(r10, 0x1, 0x3e, &(0x7f0000000080)=r9, 0x1d7) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r12 = openat$cgroup_procs(r11, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000040), 0x12) r13 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r13, 0x800454d3, 0x0) openat$cgroup_int(r13, 0x0, 0x2, 0x0) recvmsg(r13, &(0x7f0000000500)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000010c0)=""/136, 0x88}], 0x2, &(0x7f00000037c0)=""/4096, 0x1000}, 0x40002100) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x7f}, 0x3c) r15 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000080)=r15, 0x1d7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x4d, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r17, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x8a9e6d5097b8b4f5, 0x1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES64, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRESOCT=0x0], @ANYRES32], &(0x7f0000000300)='GPL\x00', 0x6, 0x0, &(0x7f0000000340), 0x40f00, 0x2, [], r16, 0x3, r17, 0x8, &(0x7f00000003c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x6, 0x2}, 0x10}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x10, 0xda, 0x7, 0x8, 0x20, r14, 0x9, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x7f}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x4d, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x8a9e6d5097b8b4f5, 0x1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRESOCT=0x0], @ANYRES32], &(0x7f0000000300)='GPL\x00', 0x6, 0x0, &(0x7f0000000340), 0x40f00, 0x2, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x6, 0x2}, 0x10}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000100)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000240)="6aaffb9ae615971d064cfa34c738f929120cca1fdb00a8ee79fbed33c8aef2722d88389a3e4b3e9e8081908daca596db98a2d7a4e4f6408a83deb692b898ff78230d1bde8219b9d9af731d69c87abd5ecdc528a7c352a252b723bfa4ac4b803a7cae381a72956f645d4798b4b282968d13f3ab1c9fbfd388edc07842af5bbc4b01456874fe9ea67a9694f9c2b2da9fe367c4b0e32560c8f2283effcb95e3468272f4ae69c86c4d274214d533de9f4e9cac9915336ba48fc97a72d156149ecd409db89b02d1c557318251d4e54590918b11a7b198a35522b1ae", 0xd9}, {0x0}, {&(0x7f0000000340)="9a95136e87577aa85753288a1846ea0350ec8ece475de0f6277f31e5241e9d5b0727c77c912ab5ba8998149bce3ac404c11a08e00441cec3a4c35978acc675c52839f23d9d9772abc3097a675509c6295d6656d6d63c4b95e13f", 0x5a}, {0x0}, {&(0x7f0000000580)="b28a6a95cdba310dda7579816774ef1936f9d6d5e2ff1f33bb0d69bf19193394422d5df825be8a44634cc098dfa7c494316a864e358c0e81cd52", 0x3a}, {&(0x7f00000005c0)="5ff50f04c498287cb18c72ed468f64518aacca40ba230def6ca633726ab42731dbdbb487f98462eb3654898c37a01cef9b6f741c57d5ff89c3f626cb59631b43f09717fe791c29f9dea395deb318fa7d78008948b04eb528ad49c30a87531289ac51b9d31334a2fae3d40160a58bdc5968ad332682f9df77833b73dd01c3de71e4f5e83fbe408672058add7c0fcdd86a7e57ae02", 0x94}, {0x0}, {&(0x7f00000007c0)}], 0x8, &(0x7f00000024c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x24}, @multicast2}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}], 0x58}, 0x4000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) write$cgroup_subtree(r2, &(0x7f0000000bc0)=ANY=[@ANYRESDEC=r3, @ANYRESOCT=r8, @ANYRES16=r6, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="ccaf475ddfeda48545d905c117278bd2c35eb504fef068008da3674153908b32ecea34ffe7dd1ef9dcf3d1c7e0ddb98b5b412fed97d78104294d955d7a25925343a0c7489a61", @ANYRESOCT=r9, @ANYRES64, @ANYRES32=0x0, @ANYRES64=0x0, @ANYRES16=r12, @ANYRES64=r7], @ANYRES16=r0, @ANYRESHEX, @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYRESHEX=r13, @ANYBLOB="63d931bd91dfd57fec2d9832413bf58f9f50b1312bb95a042c2483e85199", @ANYRESDEC=r14, @ANYBLOB="1402e1b690695436cb3debc6a363582135d19be7f3152bb93cbeb2c2cd7354fdfe9ef66eda9d3b43518d53c45d8fb6fe89bd8d1538e8448471ff40a08560a3db74adb455db8dd12534996663b388c3cdf7ed793cbc566e33728ba83e00176b3cb3d0b140976bd4273475bb8493a5a9da748c7399150604f6054a043044ae74d012a9f6672099062d60210b1d1974c8a8812e4e5ed5251bc541ae771d568dcec26ee6a09c4bd1d3b59e94151557ef25224e8a3f6f525a2c3ff6b9eb553018", @ANYRES16=r18, @ANYRESHEX, @ANYBLOB="d3"]], 0x51) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) 01:38:38 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0xd1, 0x86, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5486, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r1, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x57, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={r7, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r8 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2, 0x3, 0x84) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f0000000080)=r8, 0x1d7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') [ 428.057824][T14548] raw_sendmsg: syz-executor.4 forgot to set AF_INET. Fix it! [ 428.184272][T14558] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:38:39 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8993, &(0x7f0000000580)='ip6_vti0\x00') 01:38:39 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x63}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000010280)={0x0, 0x0, 0x0}, 0x0) 01:38:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000633a77fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 01:38:40 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket(0xa, 0x3, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) 01:38:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002811200001c0012000b0001006d616373656300e10b00020005000c00000300000a0005c03a0000000000000008000a0009d35b587e27a8b0b9cad4a128c1aa7cf68a72e13e13201546eb249c27628b043723262ef1db55855e9b9c3c4f3d85375cfa53566d1becb85f7297cb072cd567309e4df2d41485c9b6a83c953a21aa4f22f55716d40a207530362bc729067a2c1827fb817eec56022b28d49a32965d048e336c6476967ed3c025b32265056d7425271b24a7a00c7f44c83d98fd505c6a5bed69ac554740f4acfe372790fb0130a6c5472d2c1863fdd50101acad39036ed430db5f4ba99a97b267f26fbcb9e223ab48d4fb4d48", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10810005, 0xffffffffffffffef}) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/vga_arbiter\x00'}], 0xa, "70402a5408630b0032112593805ff98a37b928174cdbef7f7bf6a3d932f0fed7e3301966e75f9ce09d76fc9f114682e04f69bbe64a924035af871d11db86f37d3e5c446ed66da86d6d77d02021c08f6acde1f7db0f1968"}, 0x74) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 429.524948][T14585] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 433.175281][ T32] audit: type=1400 audit(1583804324.227:70): avc: denied { prog_run } for pid=14582 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 01:38:44 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 01:38:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:44 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket(0xa, 0x3, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) 01:38:44 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x0, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) creat(&(0x7f0000000180)='./bus\x00', 0x0) [ 433.730779][T14605] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 01:38:45 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 01:38:45 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002811200001c0012000b0001006d616373656300e10b00020005000c00000300000a0005c03a0000000000000008000a0009d35b587e27a8b0b9cad4a128c1aa7cf68a72e13e13201546eb249c27628b043723262ef1db55855e9b9c3c4f3d85375cfa53566d1becb85f7297cb072cd567309e4df2d41485c9b6a83c953a21aa4f22f55716d40a207530362bc729067a2c1827fb817eec56022b28d49a32965d048e336c6476967ed3c025b32265056d7425271b24a7a00c7f44c83d98fd505c6a5bed69ac554740f4acfe372790fb0130a6c5472d2c1863fdd50101acad39036ed430db5f4ba99a97b267f26fbcb9e223ab48d4fb4d48", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:46 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket(0xa, 0x3, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) 01:38:46 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x0, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) creat(&(0x7f0000000180)='./bus\x00', 0x0) 01:38:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)={0x1c, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4c111) 01:38:47 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 01:38:47 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) [ 436.546572][T14644] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:38:47 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) socket(0xa, 0x3, 0x8) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) ftruncate(r3, 0x600004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) 01:38:47 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002811200001c0012000b0001006d616373656300e10b00020005000c00000300000a0005c03a0000000000000008000a0009d35b587e27a8b0b9cad4a128c1aa7cf68a72e13e13201546eb249c27628b043723262ef1db55855e9b9c3c4f3d85375cfa53566d1becb85f7297cb072cd567309e4df2d41485c9b6a83c953a21aa4f22f55716d40a207530362bc729067a2c1827fb817eec56022b28d49a32965d048e336c6476967ed3c025b32265056d7425271b24a7a00c7f44c83d98fd505c6a5bed69ac554740f4acfe372790fb0130a6c5472d2c1863fdd50101acad39036ed430db5f4ba99a97b267f26fbcb9e223ab48d4fb4d48", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) 01:38:47 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f0000003000), 0xffffff92) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x8}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 01:38:48 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @empty}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x80083313, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="29310b794f3f7d83568dd99ab9241fab51243987ddbf0112e5a7eeebb3048502cdc108f96c381cf65c359a959318a7f1cbdb8b6db093ff6b2bbea16412a16cb2cd70fa19ab2d68755da92a6eca6e2287d8a4f7f32ae046c71d76c5d03321d6562308f1eb04a5ec14cbbddee1a0133fa0ca92f6ae0de139d687122c115ce2", 0x7e}, {&(0x7f00000004c0)="79a430e286bb28de9eba5da3693bd4fde282819fe3c17576efc7c993117cfd03499fc39f5620b056cb2a877f1d826d210a3ba6c956fbcefb360882dc98df41412deef36f9348c48db906cb1f61816f3158cdbfedf9c8c5408d857a5e43f34c4db7842876e7a44c8af381b3fa3b94", 0x6e}, {&(0x7f00000000c0)="c3ae90c64272d7369f8a5b4150e25efa94002bf107b5eb01e4e42c", 0x1b}], 0x3, &(0x7f0000000540)=[{0x40, 0x104, 0x1, "5f9ae8ed8d79724339f6fa8f6b02b069fff7ada2520e40f7f37ee2db167fe55c43521721e8f77871b42de63c394c14fc"}, {0x20, 0x1, 0x91, "0ca9d4f479e768a6b71b3bea"}, {0x48, 0x11, 0x3, "5af72f23cf23d456bb698a274e4860950e7d2799096d65f1a973926d8b84c2dae43b8ce7662cac277c1919878680e5c3e7b6181a"}], 0xa8}}], 0x1, 0x4840) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x157f40, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8602, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x200800, 0x0) write$P9_RREAD(r3, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x100b) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000006c0)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r4, 0x80083313, 0x0) exit(0x0) 01:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10810005, 0xffffffffffffffef}) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/vga_arbiter\x00'}]}, 0x1d) r1 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TCSETSW(r4, 0x5403, 0x0) 01:38:48 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000074774004800dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"/327], 0x50}}, 0x0) [ 437.329348][T14665] ===================================================== [ 437.336352][T14665] BUG: KMSAN: uninit-value in kmsan_check_memory+0xd/0x10 [ 437.343588][T14665] CPU: 0 PID: 14665 Comm: syz-executor.3 Not tainted 5.6.0-rc2-syzkaller #0 [ 437.352398][T14665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.362469][T14665] Call Trace: [ 437.365799][T14665] dump_stack+0x1c9/0x220 [ 437.370165][T14665] kmsan_report+0xf7/0x1e0 [ 437.374971][T14665] kmsan_internal_check_memory+0x358/0x3d0 [ 437.380814][T14665] ? __msan_poison_alloca+0xf0/0x120 [ 437.386131][T14665] kmsan_check_memory+0xd/0x10 [ 437.390909][T14665] snapshot_compat_ioctl+0x559/0x650 [ 437.396251][T14665] ? snapshot_ioctl+0x14f0/0x14f0 [ 437.401286][T14665] __se_compat_sys_ioctl+0x57c/0xed0 [ 437.406597][T14665] ? kmsan_get_metadata+0x4f/0x180 [ 437.411737][T14665] __ia32_compat_sys_ioctl+0xd9/0x110 [ 437.417306][T14665] ? compat_ptr_ioctl+0x150/0x150 [ 437.422353][T14665] do_fast_syscall_32+0x3c7/0x6e0 [ 437.427401][T14665] entry_SYSENTER_compat+0x68/0x77 [ 437.432689][T14665] RIP: 0023:0xf7ff5d99 [ 437.436827][T14665] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 437.456944][T14665] RSP: 002b:00000000f5df00cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 437.465380][T14665] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000080083313 [ 437.473554][T14665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 437.481553][T14665] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 437.489757][T14665] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 437.497757][T14665] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 437.505761][T14665] [ 437.508110][T14665] Uninit was stored to memory at: [ 437.513167][T14665] kmsan_internal_chain_origin+0xad/0x130 [ 437.518896][T14665] __msan_chain_origin+0x50/0x90 [ 437.523866][T14665] snapshot_compat_ioctl+0x5e0/0x650 [ 437.529317][T14665] __se_compat_sys_ioctl+0x57c/0xed0 [ 437.534817][T14665] __ia32_compat_sys_ioctl+0xd9/0x110 [ 437.540400][T14665] do_fast_syscall_32+0x3c7/0x6e0 [ 437.545551][T14665] entry_SYSENTER_compat+0x68/0x77 [ 437.550662][T14665] [ 437.552993][T14665] Local variable ----offset@snapshot_compat_ioctl created at: [ 437.560475][T14665] snapshot_compat_ioctl+0x324/0x650 [ 437.565778][T14665] snapshot_compat_ioctl+0x324/0x650 [ 437.571058][T14665] [ 437.573388][T14665] Bytes 0-7 of 8 are uninitialized [ 437.578497][T14665] Memory access of size 8 starts at ffffa67680fa3d30 [ 437.585165][T14665] ===================================================== [ 437.592301][T14665] Disabling lock debugging due to kernel taint [ 437.598464][T14665] Kernel panic - not syncing: panic_on_warn set ... [ 437.605172][T14665] CPU: 0 PID: 14665 Comm: syz-executor.3 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 437.615326][T14665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.625424][T14665] Call Trace: [ 437.628734][T14665] dump_stack+0x1c9/0x220 [ 437.633096][T14665] panic+0x3d5/0xc3e [ 437.637048][T14665] kmsan_report+0x1df/0x1e0 [ 437.641743][T14665] kmsan_internal_check_memory+0x358/0x3d0 [ 437.647828][T14665] ? __msan_poison_alloca+0xf0/0x120 [ 437.653165][T14665] kmsan_check_memory+0xd/0x10 [ 437.657963][T14665] snapshot_compat_ioctl+0x559/0x650 [ 437.663432][T14665] ? snapshot_ioctl+0x14f0/0x14f0 [ 437.668622][T14665] __se_compat_sys_ioctl+0x57c/0xed0 [ 437.673962][T14665] ? kmsan_get_metadata+0x4f/0x180 [ 437.679136][T14665] __ia32_compat_sys_ioctl+0xd9/0x110 [ 437.684536][T14665] ? compat_ptr_ioctl+0x150/0x150 [ 437.689588][T14665] do_fast_syscall_32+0x3c7/0x6e0 [ 437.694644][T14665] entry_SYSENTER_compat+0x68/0x77 [ 437.699940][T14665] RIP: 0023:0xf7ff5d99 [ 437.704020][T14665] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 437.723718][T14665] RSP: 002b:00000000f5df00cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 437.732142][T14665] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000080083313 [ 437.740142][T14665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 437.748132][T14665] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 437.756111][T14665] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 437.765243][T14665] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 437.774814][T14665] Kernel Offset: 0x3e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 437.786360][T14665] Rebooting in 86400 seconds..